US20070162600A1 - Promoting interoperability of presence-based systems through the use of ubiquitous online identities - Google Patents
Promoting interoperability of presence-based systems through the use of ubiquitous online identities Download PDFInfo
- Publication number
- US20070162600A1 US20070162600A1 US11/561,886 US56188606A US2007162600A1 US 20070162600 A1 US20070162600 A1 US 20070162600A1 US 56188606 A US56188606 A US 56188606A US 2007162600 A1 US2007162600 A1 US 2007162600A1
- Authority
- US
- United States
- Prior art keywords
- instant messaging
- messaging service
- online identity
- pbs1
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/043—Real-time or near real-time messaging, e.g. instant messaging [IM] using or handling presence information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/234—Monitoring or handling of messages for tracking messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/54—Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Interoperability with other network applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/214—Monitoring or handling of messages using selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/0024—Services and arrangements where telephone services are combined with data services
- H04M7/0042—Services and arrangements where telephone services are combined with data services where the data service is a text-based messaging service
- H04M7/0045—Services and arrangements where telephone services are combined with data services where the data service is a text-based messaging service where the text-based messaging service is an instant messaging service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/436—Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
- H04N21/43615—Interfacing a Home Network, e.g. for connecting the client to a plurality of peripherals
Definitions
- This disclosure relates to using an online identity to access one or more interoperable presence-based services.
- a method includes enabling access to a first instant messaging service using an online identity that is associated with a second instant messaging service, accessing a profile that indicates at least one other instant messaging service is to be provided with presence information regarding the use of the online identity to access the first instant messaging service, and providing the other instant messaging service with the presence information regarding the use of the online identity to access the first instant messaging service.
- Implementations of the above general aspect may include one or more of the following features.
- enabling access to the first instant messaging service using the online identity may comprise communicating with the second instant messaging service to authenticate the online identity.
- the communicating with the second instant messaging service to authenticate the online identity may include communicating with the second instant messaging service to authenticate the online identity without soliciting a user of the online identity.
- enabling access to the first instant messaging service using the online identity may comprise communicating with the first instant messaging service to authenticate the online identity such that the first instant messaging service authenticates the online identity and provides the other presence other instant messaging service with the presence information associated with the online identity.
- enabling access to the first instant messaging service using the online identity may comprise sending an authentication ticket to the client device from the second instant messaging service.
- enabling access to the first instant messaging service using the online identity may comprise receiving a request for access to the first instant messaging service from a client device, the request including the online identity, authenticating the online identity, and providing the client device with access to the first instant messaging service upon authentication of the online identity.
- Accessing the profile may include sending a request for publication rules from the first instant messaging service to the second instant messaging service and receiving the publication rules at the first instant messaging service from the second instant messaging service.
- accessing the profile may comprise sending a request for publication rules from the second instant messaging service to the first instant messaging service and receiving the publication rules at the second instant messaging service from the first instant messaging service.
- accessing the profile may comprise accessing a locally stored profile.
- the profile may include more than one instant messaging service, one of which is the first instant messaging service.
- the at least one other instant messaging service may include the second instant messaging service.
- the online identity may be expressed using a combination of a username and a domain name.
- accessing the profile may include accessing a list of instant messaging services to be provided with the presence information.
- accessing the profile may include accessing a set of publication rules.
- the profile may be associated with the online identity.
- the profile further may identify an identity of the instant messaging service that is to be provided with the presence information regarding the user of the online identity to access the first instant messaging service. Determining, from the profile, the other instant messaging service that is to be provided with presence information regarding the use of the online identity to access the first instant messaging service.
- Providing the other instant messaging service with the presence information may comprise sending the presence information from the first instant messaging service to the other instant messaging service.
- providing the other instant messaging service with the presence information may comprise sending the presence information from the second instant messaging service to the other instant messaging service.
- Implementations of the above general aspect may also include one or more of the following features.
- Providing the presence information to subscribers may include providing the presence information to subscribers by the first instant messaging service independent from other instant messaging services.
- Providing the presence information to subscribers may include providing the presence information to subscribers by the first instant messaging service in response to or at a direction of another instant messaging service.
- a method includes receiving a request to access a first instant messaging service, the request including an online identity and determining that the online identity is associated with a second instant messaging service. The method also includes communicating with the second instant messaging service to enable authentication of the online identity and upon authentication of the online identity, enabling access to the first instant messaging service.
- determining that the online identity is associated with the second instant messaging service may include determining that the online identity is associated with an account at the second instant messaging service.
- determining that the online identity is associated with the second instant messaging service may include determining that the online identity is registered with the second instant messaging service.
- the request also may include credentials associated with the online identity.
- Receiving the request to access the first instant messaging service may include receiving, at the client system, the request from a user.
- Enabling access to the first instant messaging service may include sending, from the client system, the authentication ticket to the first instant messaging service.
- the implementations of the above general aspect may also include sending the authentication ticket from the first instant messaging service to the second instant messaging service, requesting verification of the authentication ticket from the second instant messaging service, and receiving a verification message from the second instant messaging service.
- Determining that the online identity is associated with the second instant messaging service may include determining that the online identity is associated with the second instant messaging service based on the online identity or the received credentials.
- Receiving the request to access the first instant messaging service may include receiving, from the client system, the request at the first instant messaging service, determining that the online identity is associated with the second instant messaging service may include determining, at the first instant messaging service, that the online identity is associated with the second instant messaging service, and communicating with the second instant messaging service may include sending an authentication request from the first instant messaging service to the second instant messaging service, and in response to sending the authentication request, receiving, at the first instant messaging service, an indication of authentication from the second instant messaging service; and enabling access to the first instant messaging service may include enabling the client system to access the first instant messaging service.
- the authentication request may include the online identity and the received credentials.
- Implementations of the above general aspect may also include storing the received credentials to enable future authentication of the online identity without sending the authentication request to the second instant messaging service.
- Receiving the request to access the first instant messaging service may include receiving, from a client system, the request at the first instant messaging service and determining that the online identity is associated with the second instant messaging service may include determining, at the first instant messaging service, that the online identity is associated with the second instant messaging service.
- Communicating with the second instant messaging service may include requesting, at the first instant messaging service and from the second instant messaging service, credentials associated with the online identity, in response to the request, receiving the requested credentials associated with the online identity at the first instant messaging service from the second instant messaging service, comparing, at the first instant messaging service, the requested credentials to the received credentials from the client system, determining, at the first instant messaging service, whether the requested credentials matches the received credentials from the client system, and authenticating the online identity, at the first instant messaging service, if the requested credentials match the received credentials from the client system.
- Enabling access to the first instant messaging service may include enabling the client system to access the first instant messaging service.
- Implementations of the above general aspect may also storing the requested credentials to enable future authentication of the online identity without requesting the credentials associated with the online identity from the second instant messaging service.
- Enabling access to the first instant messaging service may include enabling the online identity to share its presence information with at least one other online identity and send an receive instant messages from the at least one other online identity.
- Implementations of the described techniques may include hardware, a method or process, or computer software on a computer-accessible medium.
- the details of one or more implementations are set forth in the accompanying drawings and the description below. Other features will be apparent from the description and drawings, and from the claims.
- access to a first instant messaging service using an online identity is allowed.
- a profile associated with the online identity is accessed and the profile is updated to indicate that the online identity is currently being used to access the first instant messaging service.
- a message is received from another instant messaging service at the first instant messaging service. The message indicates that the online identity is currently being used to access a second instant messaging service.
- the profile is updated to indicate that the online identity is currently being used to access the second instant messaging service.
- Implementations may include one or more of the following features.
- allowing access to the first instant messaging service using the online identity may include receiving a request to access the first instant messaging service, the request including the online identity; determining that the online identity is associated with the second instant messaging service; and communicating with the second instant messaging service to authenticate the online identity.
- the online identity may be associated with the first instant messaging system or the second instant messaging system.
- the online identity may be expressed using a combination of a username and a domain name.
- Updating the profile to indicate that the online identity is currently being used to access the second instant messaging service may include updating a table to include an identity of the second instant messaging system.
- the table may be updated to include an identity of a client device accessing the second instant messaging service using the online identity.
- the table also may be updated to include the duration of time the online identity has been used to access the second instant messaging service.
- the other instant messaging service may include the second instant messaging service.
- Updating the profile may include updating a counter that indicates the number of times the online identity is used to access one or more instant messaging services. Updating the profile may include decrementing the counter if it is determined that the online identity has logged off from either the first instant messaging service or the second instant messaging service.
- a particular instant messaging service from which the online identity has logged off may be identified and the one or more instant messaging services may be notified that the online identity has logged off the particular instant messaging service.
- a client device from which the online identity has logged off may be identified and the one or more instant messaging services may be notified that the online identity has logged off the client device.
- Whether a value of the counter is equal to zero may be determined; and if so, the one or more instant messaging services may be notified of the online identity's complete loss of presence. Accessing the profile may include accessing a profile maintained by the first instant messaging service.
- a message directed to an online identity may be received at a first instant messaging service. It is determined that the online identity has a connection to the first instant messaging service through a second instant messaging service.
- traffic delivery rules are accessed. The traffic rules are configured to control delivering of the message and are customized for an individual. At least a portion of the traffic delivery rules and the message are sent to the second instant messaging service, thereby enabling the second instant messaging service to deliver the message to the online identity according to the traffic delivery rules.
- the traffic delivery rules may be customized for the online identity and, as such, the traffic delivery rules may govern receipt of the message based on preferences of the online identity.
- the traffic delivery rules may be customized for a sender of the message and, as such, the traffic delivery rules may regulate delivery of the message based on preferences of the sender of the message.
- Accessing the traffic delivery rules may include accessing traffic delivery rules stored at the first instant messaging service. Accessing the traffic delivery rules may include accessing traffic delivery rules stored at the second instant messaging service.
- the traffic delivery rules may include instructions for delivery of the message through one or more instant messaging services.
- the traffic delivery rules may include instructions for delivery of the message based on a type of client device.
- the traffic delivery rules may include instructions for delivery of the message based on a particular time of day.
- the traffic delivery rules may include instructions for delivery of the message to a client device at which the online identity has an active presence.
- the traffic delivery rules may instructions for determining whether the online identity has a direct presence at the first instant messaging service and, in the absence of the direct presence at the first instant messaging service, delivering the message to the online identity through the second instant messaging service.
- the traffic delivery rules may include instructions for directing the first instant messaging service to deliver the message to the online identity through the second instant messaging service.
- Sending at least the portion of the traffic delivery rules and the message to the second instant messaging service may include appending the traffic delivery rules to the message and sending the message with the appended traffic delivery rules to the second instant messaging service.
- Sending at least the portion of the traffic delivery rules and the message to the second instant messaging service may include sending at least the portion of the traffic delivery rules to the second instant messaging service separate from submitting the message to the second instant messaging service.
- Sending at least a portion of the traffic delivery rules to the second instant messaging service separate from submitting the message to the second instant messaging service may include resubmitting the traffic delivery rules to the second instant messaging service as the traffic delivery rules changes.
- Sending at least the portion of the traffic delivery rules may include sending less than all of the traffic delivery rules to the second instant messaging service.
- Sending less than all of the traffic delivery rules to the second instant messaging service may include sending less than all of the traffic delivery rules customized for the online identity to the second instant messaging service.
- Sending less than all of the traffic delivery rules to the second instant messaging service may include sending less than all of the traffic delivery rules customized for a sender of the message to the second instant messaging service.
- the individual includes an operator of the online identity or a sender of the message.
- a message directed to an online identity may be received from a source at a first instant messaging service.
- Traffic delivery rules stored at a second instant messaging service are accessed.
- the traffic delivery rules are configured to control delivering of the message and are customized for an individual.
- the message is delivered to the online identity according to the traffic delivery rules.
- Implementations may include one or more of the following features. For example, it may be determined that the online identity has a connection to the first instant messaging service through a third instant messaging service.
- the third instant messaging service may access the traffic delivery rules stored at the second instant messaging service and delivers the message to the online identity according to the traffic delivery rules.
- the second instant messaging service may be informed of the online identity presence at the third instant messaging service and, in response, receiving, from the second instant messaging service, the traffic delivery rules that are customized for the online identity.
- the individual may include an operator of a client system using the online identity.
- Implementations of the described techniques may include hardware, a method or process, or computer software on a computer-accessible medium.
- FIG. 1 illustrates an open name space network that includes a client system connected to a first presence-based system (“PBS1”) and a second presence-based system (“PBS2”) via a network.
- PBS1 first presence-based system
- PBS2 second presence-based system
- FIGS. 2A-2B illustrate processes for allowing access to PBS1 with an online identity that is associated with the domain of PBS1.
- FIG. 3A illustrates a process for allowing access to PBS2 with an online identity that is not associated with the domain of PBS2.
- FIGS. 3B-3E illustrate various methods used by PBS2 to authenticate an online identity.
- FIG. 4A illustrates a graphical user interface used to enable input of an online identity and credentials.
- FIG. 4B illustrates a process for allowing an online identity, which is entered using the graphical user interface of FIG. 4A and which includes an obscure domain, to access PBS2, which does not have interoperability with presence-based system associated with the obscure domain.
- FIG. 5 illustrates a registration form that an operator of a client device may complete in order to gain access to a presence-based system.
- FIG. 6 illustrates online presence of online identities at a presence-based service of PBS2.
- FIG. 7 illustrates, in more detail, the credentials database of FIG. 3D that stores credentials of an online identity.
- FIGS. 8A-9C illustrate various methods for informing foreign presence-based services of presence information for an online identity.
- FIG. 10 illustrates an example of a table containing presence information.
- FIG. 11 illustrates an open name space network that includes a client mobile device.
- FIG. 12 illustrates a process for allowing a computer operator using an online identity to gain access to PBS2, and later, but concurrently, a client mobile device operator using the same online identity to gain access to PBS1.
- FIGS. 13A-13B illustrate processes for authenticating and authorizing the operator of the client system of FIG. 12 to access PBS2, projecting changes in presence to PBS2 subscribers, and publishing the changes in presence to PBS1.
- FIG. 14 illustrates a process for authenticating and authorizing the operator of the client mobile device of FIG. 12 to access PBS1, optionally projecting changes in presence to PBS1 subscribers, and optionally publishing changes in presence to PBS2.
- FIG. 15 illustrates a process for PBS1 to publish full attribution or limited attribution of changes in presence.
- FIG. 16A illustrates an example of a table storing presence information.
- FIG. 16B illustrates an example of a counter used to track when an online identity is used to access one or more presence-based systems.
- FIG. 16C illustrates an example of a table storing presence information.
- FIGS. 17A-17C illustrate various methods for delivering traffic to an online identity at multiple client devices through PBS1 and/or PBS2.
- FIG. 18 illustrates a process for allowing a computer operator using an online identity to gain access to PBS2, and later, but concurrently, a client mobile device operator using the same online identity to gain access to PBS2.
- FIGS. 19A-19C illustrate various methods for communicating traffic delivery rules hosted by PBS1 to PBS2.
- FIG. 20 illustrates an example of content within a traffic delivery rules database hosted by a presence-based system.
- a client system 110 may attempt to access a first presence-based system (“PBS1”) 120 operated by a first administrative domain and a second presence-based system (“PBS2”) 130 operated by a second, different administrative domain, using an online identity that is included in an open name space.
- the open name space may include one or more electronic addresses that include a domain name.
- the online identities may have the form username@domain.
- user@PBS1.com may be an online identity associated with PBS1 (e.g., registered with PBS1), with “user” being the username and “PBS1.com” being the domain name of PBS1.
- the online identity may or may not be a valid e-mail address for the user of the online identity.
- the user may therefore register an online identity that is used in other contexts (e.g., e-mail) or used with respect to at least one of several interoperating presence-based services, such that the user can leverage the open name space without seeking any additional online identities or abandoning the use of any existing online identities. That is, the user may register the online identity with one domain, and use that identity to access other domains. For instance, a user can use an existing e-mail address (which may also be registered as the online identity for an instant messaging (IM) service operated in the same administrative domain as the e-mail) as an online identity with respect to one or more other instant messaging services with which the user has not otherwise registered.
- IM instant messaging
- the online identity simply reflects the e-mail address, including the user domain/source/origin through which the e-mail address was initially registered.
- a user may register an online identity with a first administrative domain that uses the identity as an e-mail address and as an identifier for presence-based services offered by the domain.
- the user then may use the online identity to access presence-based services operated by other, administrative domains, without specifically registering the online identity with those other administrative domains.
- the user may have registered user@yahoo.com for e-mail and instant messaging operated by Yahoo!®.
- the user then may use the online identity user@yahoo.com to access the IM service operated by AOL® (referred to as AIM®).
- an open name space network 100 includes a client system 110 , PBS1 120 , PBS2 130 , and a network 139 .
- the client system 110 includes client software 112 configured for presence-based service of PBS1 120 or PBS2 130 .
- the operator of client system 110 uses the client software 112 to communicate with PBS1 120 or PBS2 130 via the network 139 .
- PBS1 120 includes a login server 122 and a presence-based service 124 .
- PBS2 130 includes a login server 132 and a presence-based service 134 .
- Login server 122 or 132 authorizes access by client system 110 to the presence-based systems 120 and 130 .
- Presence-based service 124 and/or 134 allows the client system 110 to communicate with other client systems connected to one or more interoperable presence-based services 124 or 134 via the network 139 .
- PBS1 120 and PBS2 130 may represent AOL® and EarthLink® internet service providers, and presence-based services 124 and 134 for PBS1 120 and PBS2 130 may represent AOL® IM and EarthLink® IM infrastructures, respectively.
- an online identity identified as user@EarthLink.com is able to send and receive instant messages and share presence information with users of the AOL® IM service and the EarthLink® IM service, regardless of whether user@EarthLink.com is logged into clients of either or both of those services.
- FIGS. 2A-2B illustrate processes 200 A and 200 B, respectively for allowing an online identity to access a presence-based system, e.g., PBS1 120 , associated with a domain of the online identity (e.g., user@PBS1.com logs into PBS1).
- FIG. 2A illustrates a general process 200 A for allowing a client system to access a presence-based system, e.g., PBS1, using an online identity associated with the domain of PBS1.
- Process 200 A begins with the client system 110 initiating communication with PBS1 120 using an online identity, user@PBS1.com ( 201 a ). To do so, the client system 110 may use the client software 112 configured for the presence-based service 124 of PBS1 120 .
- the client system 110 may use the client software 112 to submit the online identity and credentials associated therewith to PBS1 120 .
- PBS1 120 is associated with the domain of the online identity because the online identity was initially registered with that presence-based system, and hence reflecting the domain name after the “®” symbol.
- the login server 112 of PBS1 120 authenticates the client system ( 202 a ) and communicates the authentication to the presence-based service 124 .
- the presence-based service 124 projects changes in presence of user@PBS1.com to PBS1 120 users that subscribe to presence information for user@PBS1.com ( 203 a ). This may include informing such subscribers that user@PBS1.com has logged into presence-based service 124 and is available to chat.
- process 200 B is similar in some respects to the process 200 A of FIG. 2A , but provides a more detailed example of authenticating and authorizing the client system 110 to access PBS1 using the online identity, user@PBS1.com.
- Process 200 B begins with the client system 110 submitting a request to access presence-based service 124 offered by PBS1 120 ( 210 b ).
- the client system 110 may use the client software 112 configured for PBS1 to submit the request, which may include the online identity user@PBS1.com.
- PBS1 120 receives the request ( 211 b ), and, in response, PBS1 120 requests credentials for user@PBS1.com ( 212 b ).
- the client system 110 provides PBS1 120 with the credentials as part of the original request; thus, eliminating the need for PBS1 120 to solicit the client system 110 for credentials.
- the client system 110 receives the request for the credentials ( 213 b ) and requests the credentials from the operator of the client system 110 ( 214 b ). In response, the operator of the client system 110 provides the credentials (e.g., password), which are submitted to PBS1 120 ( 215 b ). PBS1 120 receives the credentials ( 216 b ) and authenticates user@PBS1.com ( 217 ). To authenticate user@PBS1.com, the login server 122 matches the online identity and password to the information stored in a credentials database. If such match exists, then the login server 122 enables the client system 110 to access the presence-based service 124 offered by PBS1 120 ( 218 b and 219 b ).
- PBS1 120 receives the credentials ( 216 b ) and authenticates user@PBS1.com ( 217 ).
- the login server 122 matches the online identity and password to the information stored in a credentials database. If such match exists, then the login server 122 enables the client system 110 to access the presence-based
- the presence-based service 124 projects the online presence of the online identity to users of PBS1 120 that have subscribed to such information ( 220 b ) (e.g., list the online identity among their instant message contact list) or who make a specific request for knowledge that user@PBS1.com has logged into the presence-based service 124 offered by PBS1 120 and is available to chat.
- FIG. 3A illustrates a process 300 A for allowing a client system 110 to access a presence-based system, e.g., PBS2 130 , using an online identity that is not associated with the domain of PBS2 130 (e.g., user@PBS1.com logs into PBS2 130 ).
- Process 300 A begins with the client system 110 initiating communication with PBS2 130 , which has interoperability with PBS1 120 ( 301 a ). To do so, the client system 110 may use the client software 112 configured for PBS2 130 .
- the client software 112 may provide the online identity, e.g., user@PBS1.com, and associated password to a login server 132 of PBS2 130 .
- PBS2 130 recognizes that the online identity is associated with PBS1 120 due to the domain name in the online identity.
- PBS2 130 consults a table that includes association between the domain names and the presence-based service associated therewith to identify the presence-based service (e.g., PBS1 120 ) that is associated with user@PBS1.com.
- PBS2 130 may provide the domain name to a domain name server to identity the presence-based service associated with user@PBS1.com.
- the domain name server identifies PBS1 120 , resolves an IP address associated with PBS1 120 , and provides this information to PBS2 130 to enable PBS2 130 to communicate with PBS1 120 .
- PBS2 130 then initiates communication with PBS1 120 , the presence-based system associated with the domain of user@PBS1.com, in order to authenticate user@PBS1.com ( 302 a ).
- PBS2 130 enables access by the client system 110 to the presence-based service 134 of PBS2 130 .
- the presence-based service 134 projects the online presence of user@PBS1.com to users of PBS2 130 ( 303 a ).
- the online presence is projected to users of PBS2 130 that subscribe to such information (e.g., list the online identity among their instant message contact list) or who make a specific request for knowledge of user@PBS1.com's presence. Presence may also be reflected for aliases associated with the online identity, user@PBS1.com, which aliases may be accessed at either of PBS1 120 or PBS2 130 .
- FIGS. 3B and 3C illustrate various processes used by PBS2 130 to authenticate an online identity, user@PBS1.com, as generally illustrated by the operation block ( 302 a ) in FIG. 3A .
- PBS2 130 delegates the authentication of the online identity to PBS1 120 .
- PBS2 130 request authentication information from PBS1 120 and PBS2 130 performs the authentication.
- Processes 300 B and 300 C of FIGS. 3B and 3C each provide a more detailed example of authenticating and authorizing the client system 110 to access PBS2 130 using the online identity, user@PBS1.com.
- FIG. 3B illustrates a process 300 B that enables PBS2 130 to delegate authentication of user@PBS1.com to PBS1 120 .
- Process 300 B begins with the client system 110 submitting a request to access presence-based service 134 offered by PBS2 130 .
- the client system 110 may use the client software 112 installed on the computer 110 and configured for presence-based service 134 to submit the request to access the presence-based service 134 .
- the request may include the online identity, user@PBS1.com.
- PBS2 130 receives the request ( 311 b ) and, in response, requests credentials associated with user@PBS1.com ( 312 b ).
- the client system 110 receives the request for credentials ( 313 b ) and requests the credentials from the operator of the client system 110 ( 314 b ).
- the operator of the client system 110 provides the credentials (e.g., password), which are submitted to PBS2 130 ( 315 b ).
- PBS2 130 receives the credentials ( 316 b ) and recognizes that user@PBS1.com and/or the credentials associated therewith is associated with PBS1 120 . As noted above with respect to FIGS.
- PBS2 130 may recognize that user@PBS1.com is associated with PBS1 120 by referencing the domain name included in user@PBS1.com. To this end, PBS2 130 references the domain name appearing after the @ symbol to recognize the domain associated with user@PBS1.com.
- PBS2 130 Upon recognizing that user@PBS1.com is associated with PBS1 120 , PBS2 130 submits to PBS1 120 (or proxy thereof) the online identity and the received credentials, e.g., password, ( 318 b ). PBS1 120 receives the online identity and the credentials ( 319 b ), authenticates the online identity ( 320 b ), and returns an indication of authentication to PBS2 130 ( 321 b ). To authenticate user@PBS1.com, PBS1 120 may use the login server 122 . The login server 122 attempts to match user@PBS1.com and the credentials to stored information in its credentials database. If a match exists, the login server 122 returns the indication of the authentication to PBS2 130 .
- PBS1 120 may use the login server 122 . The login server 122 attempts to match user@PBS1.com and the credentials to stored information in its credentials database. If a match exists, the login server 122 returns the indication of the authentication to PBS2 130 .
- PBS1 120 simply notifies PBS2 130 of whether or not user@PBS1.com has been successfully authenticated ( 321 b ).
- PBS2 130 receives this notification ( 323 b ) and based on this information, PBS2 130 provides or denies access to the client system 110 accordingly ( 324 b - 325 b ). If the client system 110 is provided access, PBS2 130 projects presence information for user@PBS1.com to PBS2 130 subscribers who have subscribed to such information ( 327 b ). Similarly, PBS1 may optionally project the presence information for user@PBS1.com to PBS1 120 subscribers who have subscribed to such information ( 322 b ).
- PBS2 130 may optionally store, within its credentials database, the credentials submitted with respect to user@PBS1.com and record an indication of whether or not such credentials were used to successfully authenticate user@PBS1.com ( 326 b ). Thereafter, subsequent requests made on behalf of user@PBS1.com are handled without requiring input from PBS1 120 .
- PBS2 130 obtains certain information from the operator of the client system 110 who is using an online identity corresponding to a different domain (e.g., user@PBS1.com). Specifically, for example, PBS2 130 requests completion of a registration form 500 of FIG.
- PBS2 130 in response to which PBS2 130 receives information such as date of birth, gender, country of origin, zip code, and alternate e-mail address.
- the registration form 500 also may elicit a credit card number for verifying the received information.
- PBS2 130 stores the online identity's credentials into its credentials database, conditioned (under one scenario) upon a determination that the operator of the client system 110 meets a minimum age requirement, as shown in FIG. 7 .
- the login server 132 of PBS2 130 includes a login process 132 a and a credentials database 132 b .
- the credentials database 132 b stores credentials, e.g., e-mail address, password, age, and credit card information.
- credentials e.g., e-mail address, password, age, and credit card information.
- PBS2 130 may be configured to itself perform the authentication of the online identity associated with other domains such as user@PBS1.com. That is, PBS2 130 does not have to delegate to PBS1 120 the authentication process. Instead, referring to FIG. 3C , PBS2 130 may use a process 300 C to request the credentials information from PBS1 120 , and PBS2 130 may use the credential information to perform the authentication process.
- Process 300 C begins with actions ( 310 c - 317 c ) which are the same as actions ( 310 b - 317 b ), and, as such, are previously described with respect to actions ( 310 b - 317 b ).
- Process 300 C differs from process 300 B because it includes PBS2 130 requesting credentials from PBS1 120 ( 318 c ) and authenticating user@PBS1.com mail to: user@PBS1.com based on the received credentials ( 321 c ).
- PBS2 130 submits a request for credentials associated with the online identity to PBS1 120 ( 318 c ).
- PBS1 120 receives the request for credentials ( 319 c ) and provides PBS2 130 with the credentials associated with the online identity ( 320 c ).
- PBS2 130 receives the credentials and compares it to the credentials received from the client system 110 to determine whether a match exists. If so, PBS2 130 authenticates the online identity ( 321 c ).
- a process 300 D may be used to identify whether PBS2 130 previously stored the credentials information at the conclusion of the previous processes 300 B and 300 C, and, if so, to authenticate the online identity internally.
- Process 300 D begins with the client system 110 submitting a request to access presence-based service 132 offered by PBS2 130 ( 310 d ).
- the client system 110 may use the client software 112 configured for PBS2 130 to access the presence-based service 134 .
- the request may include the online identity, user@PBS1.com.
- the login processor 132 a receives the request ( 311 d ) and, in response, requests credentials for user@PBS1.com ( 312 d ).
- the client system 110 receives the request for credentials ( 313 d ) and requests the credentials from the operator ( 314 d ).
- the operator of the client system 110 provides the credentials, which are submitted to the login processor 132 a ( 315 d ).
- the login processor 132 a receives the credentials ( 316 d ) and submits a request to access credentials database 132 b ( 317 d ).
- the credentials database 132 b receives the request ( 318 d ) and provides access to the login processor 132 a ( 319 d ).
- the login processor 132 a receives access ( 320 d ) and compares the received credentials to those in the credentials database in order to verify the received credentials ( 321 d ).
- the login processor 132 a attempts to identify a match for the online identity and determine whether the online identity can log into PBS2 130 without relying on PBS1 120 . If PBS2 130 had stored the information at the conclusion of the previous processes 300 B or 300 C, as optionally illustrated by FIGS. 3B and 3C , then the login processor 132 a authenticates the online identity using the information in the credentials database 132 b . Otherwise, the login process 132 a relies on PBS1 120 for authentication in the manner as illustrated in FIGS. 3B and 3C .
- the login processor 132 a determines that no match exists ( 322 d )
- the login processor 132 a relies on PBS1 120 in order to verify the received credentials.
- the login processor 132 a recognizes that user@PBS1.com is associated with PBS1 120 ( 323 d ) and submits user@PBS1.com and the received credentials to PBS1 120 to enable PBS1 120 to authenticate user@PBS1.com and return a notification of authentication ( 324 d - 327 d ), similar to actions ( 318 b - 323 b ) described with respect to process 300 B of FIG. 3B .
- the login processor 132 a may submit a request to obtain credentials information from PBS1 120 and perform the authentication itself ( 324 - 327 d ), similar to actions ( 318 c - 321 c ) described with respect to process 300 C of FIG. 3C .
- PBS2 130 when an operator of the client system 110 attempts to access PBS2 130 using an online identity, user@PBS1.com, PBS2 130 recognizes that the online identity is associated with another presence-based system (e.g., PBS1 120 ) and instructs or redirects the client software 112 to authenticate with PBS1 120 first. In particular, PBS2 130 redirects the client software 112 to PBS1 120 for authentication. PBS1 120 then authenticates user@PBS1.com and generates an authentication ticket, which PBS1 120 then sends to the client software 112 . The authentication ticket may be used by the client software 112 to access PBS2 130 . As such, the client software 112 presents the authentication ticket to PBS2 130 to gain access to PBS2 130 . Upon receiving the authentication ticket, PBS2 130 validates the authentication ticket with PBS1 120 . If the authentication ticket is validated, PBS2 130 enables the client system 110 to access PBS2 presence-based service 134 .
- PBS1 120 another presence-based system
- FIG. 3E illustrates an example of a process 300 E that may be used to implant the above described techniques.
- Process 300 E begins with the client system 110 submitting a request to access presence-based service 134 offered by PBS2 130 ( 310 e ).
- the client system 110 may use the client software 112 configured for PBS2 130 to submit the request.
- the client software 112 may provide an interface on the client system 110 for enabling the operator to provide the online identity (and possibly credentials) to be submitted with the request.
- PBS2 130 receives the request ( 311 e ) and identifies that user@PBS1.com is associated with PBS1 120 ( 312 e ). To identify the domain with which user@PBS1.com is associated with, in one implementation, PBS2 130 references the domain name appearing after “@” symbol, which identifies the domain with which the online identity is registered. In a slightly different scenario, PBS2 130 requests that the computer operator identify which domain the online identity is registered. For example, PBS2 130 may instruct the client software 112 to include a field (e.g., a domain name field) that solicits the computer operator for such information.
- a field e.g., a domain name field
- PBS2 130 redirects the client software 112 to PBS1 120 for authentication ( 313 e ).
- the client software 112 receives the redirection notice ( 314 e ) and submits the request for authentication to PBS1 120 ( 315 e ).
- the client software 112 may be modified to include, within its user interface, specific authentication fields associated with PBS1 120 .
- the specific field may include a user name field and a password field, each of which carrying the PBS1 120 identifier, to inform the computer operator they are associated with PBS1 120 .
- the client software 112 may launch another user interface (e.g., a web page) associated with PBS1 120 and prompt the computer operator to complete the fields within the user interface.
- the computer operator may enter the online identity within one of the fields and submit it to PBS1 120 .
- PBS1 120 receives the request for authentication ( 316 e ) and requests credentials for user@PBS1.com ( 317 e ).
- the client system 110 receives the requests for credentials and requests credentials from the computer operator ( 318 e ).
- the computer operator provides the credentials (e.g., password), which are submitted to PBS1 120 ( 319 e ).
- the computer operator may submit the credentials along with the online identity thereby relieving PBS1 120 from having to request it.
- PBS1 120 receives the credentials ( 320 e ) and authenticates user@PBS1.com by comparing the received online identity and password with the stored credentials within the credentials database ( 321 e ). Upon authenticating user@PBS1.com, PBS1 120 generates an authentication ticket to enable the client system 110 to access PBS2 130 ( 322 e ) using the online identity user@PBS1.com. PBS 120 returns the authentication ticket to the client software 112 ( 323 e ). The client software 112 receives the authentication ticket ( 324 e ) and submits the ticket with the online identity to PBS2 130 ( 325 e ).
- PBS2 130 receives the ticket ( 326 e ) and requests, from PBS1 120 , validation of the ticket ( 327 e ).
- PBS1 120 receives the request ( 328 e ), validates the ticket and returns a notice of validation to PBS2 130 ( 329 e ).
- PBS2 130 receives the notice of validation and allows the client system 110 to access PBS2 130 using the online identity user@PBS1.com ( 330 e and 331 e ).
- the client software 112 may be configured to automatically send the authentication request to PBS1 120 when the computer operator uses user@PBS1.com as an online identity to access PBS2 presence-based service 134 .
- process 300 E may be modified such that instead of submitting the request to PBS2 130 , the client software 112 recognizes the online identity is associated with PBS1 120 and instead the client software 112 sends the authentication request to PBS1 120 .
- the modified process would continue with the remaining actions ( 318 e - 331 e ).
- PBS2 130 may instruct the client software 112 to automatically send future authentication requests to PBS1 120 .
- the client software 112 may be able to use different login modules, each one for a different system, and PBS2 130 may instruct the client software 112 to use the module for PBS1 120 .
- FIG. 4A illustrates a graphical user interface 400 A used to enable input of an online identity and credentials therefor.
- an e-mail address is used as the online identity.
- a computer operator attempts to log into PBS2 130 using the online identity user@xyz.com, which is associated with a domain (xyz.com) that is not associated with PBS2 130 or any of the presence-based systems with which PBS2 130 has established interoperability.
- PBS2 130 elicits completion by the computer operator of a registration form, such as the one shown in FIG. 5 .
- Process 400 B begins with client system 110 submitting a request to access presence-based service 134 offered by PBS2 130 using the online identity user@xyz.com ( 410 b ).
- PBS2 130 receives the request ( 411 b ) and, in response, requests credentials for user@xyz.com ( 412 b ).
- the client system 110 receives the request for credentials and requests the credentials from the operator of the client system 110 ( 413 b ).
- the operator of the client system 110 provides the credentials which are submitted to PBS2 130 ( 414 b ).
- PBS2 receives the credentials ( 415 b ) and submits a request for registration to the client system 110 ( 416 b ).
- PBS2 130 may submit the registration form 500 of FIG. 5 to the client system 110 for completion by the operator.
- the client system 110 receives the request for registration ( 417 b ) and the operator completes the registration form, which is forwarded to PBS2 130 ( 418 b ).
- PBS2 130 receives the completed registration form ( 419 b ) and sends a verification e-mail to the online identity of the computer user and requests a reply to the e-mail ( 420 b ).
- the operator of the client system 110 receives the verification e-mail ( 421 b ) and replies to the e-mail ( 422 b ).
- PBS2 130 allows the client system 110 to access the presence-based service 134 ( 425 b and 426 b ).
- PBS2 130 conditions access by the client system 110 upon receipt of a reply to the verification e-mail sent to the e-mail address entered by the computer operator as an online identity, as such a reply suggests valid operation by the computer operator of an account with the unassociated domain under the identified e-mail address.
- PBS2 130 may store information received during authentication concerning credentials of the online identity, user@xyz.com, and their validity, so that it does not have to seek assistance from other systems or user e-mail verification the next time access is sought by user@xyz.com to PBS2 130 ( 424 b ).
- online presence of the online identity, user@PBS1.com and/or user@xyz.com may be reflected at the presence-based service into which a computer operator using the online identity logged in.
- FIG. 6 an example of a user interface 600 illustrates online presence of the online identities, user@PBS1.com and user@xyz.com, at a presence-based service of PBS2 130 into which operators using various online identities have logged in.
- the PBS2 130 subscriber may send messages to user@xyz.com and/or user@PBS1.com or receive messages from them.
- presence information may be communicated from one such service to another to be made apparent to subscribers of the different services.
- communications similarly may be sent and received by subscribers of the different services, all irrespective of whether a computer user gains access to a presence-bases system using client software or hosted portals provided by the domain to which its online identity is associated or another different domain service.
- PBS2 130 may be configured to communicate with other (e.g., foreign) interoperable presence-based services, e.g., PBS1 120 , associated with the domain of the online identity (user@PBS1.com in this example) and to inform these services of presence by the online identity through the PBS2 presence-based service 134 , or changes thereto, e.g., log in, log off, idle, and away.
- PBS1 120 e.g., PBS1 120
- PBS2 presence-based service 134 associated with the domain of the online identity
- changes thereto e.g., log in, log off, idle, and away.
- FIGS. 8A-9C There are many ways for informing the foreign presence-based services of the change in presence, several of which are illustrated in FIGS. 8A-9C .
- PBS2 130 which has locally authenticated the online identity, user@PBS1.com, informs a foreign presence-based service (e.g., PBS1 120 ) of presence by user@PBS1.com.
- a foreign presence-based service e.g., PBS1 120
- FIGS. 9A-9C the foreign presence-based service, e.g., PBS1 120
- the foreign presence-based service is informed of user@PBS1.com presence by virtue of having to authenticate the user@PBS1.com (an example of which was illustrated in FIG. 3B ).
- FIG. 8A illustrates a process 800 A in which PBS2 130 accesses a local list of foreign interoperable presence-based services to publish the change in presence associated with the online identity to all or a subset of all the foreign interoperable presence-based services appearing on the list.
- Process 800 A begins with the client system 110 initiating communication with PBS2 130 .
- the computer operator may use a user interface, such as, for example, the user interface 400 of FIG. 4A to enter the online identity and credentials.
- the computer operator may enter user@PBS1.com within the screen name field of the user interface 400 , enter the credentials associated with user@PBS1.com within the password field, and then select the “sign on” button within the user interface 400 .
- the selection of the “sign on” button results in the client system 110 sending a request to PBS2 130 for access to PBS2 130 , with the request including the online identity and the credentials.
- PBS2 130 receives the request and authenticates user@PBS1.com, without notifying or relying upon PBS1 120 ( 802 a ). For instance, PBS2 130 may authenticate user@PBS1.com using credentials stored in the credentials database 132 b as a result of process 300 C or 300 D. After successful authentication of user@PBS1.com, PBS2 130 accesses a profile that includes a local list of foreign interoperable presence-based services ( 803 a ). The local list enables PBS2 130 to consult its own publication rules in publishing presence information to other services ( 804 a ). For example, PBS2 130 may publish the presence information to all of the foreign presence-based services on the list.
- PBS2 130 may publish the presence information to the presence-based services that are associated with the domain of the online identity, e.g., PBS1 120 in the example involving user@PBS1.com.
- PBS2 130 may publish the presence information to a subset or more of the services on the list. For instance, PBS2 130 may not provide access to presence information for its subscribers by subscribers of obscure services that do not have interoperability with PBS2 130 service or other services on the list.
- PBS2 130 may provide its local list of interoperable services to a single or limited set of foreign presence-based service(s) (or proxy therefor) and request or rely upon the foreign presence-based service(s) (or proxy thereof) to publish the change in presence to other services.
- PBS2 130 instead of or in addition to PBS2 130 accessing a list to identify other foreign interoperable presence-based services (e.g., PBS1 120 ) that may be interested in presence information associated with user@PBS1.com, PBS2 130 receives a request from other foreign interoperable presence based services, notifying PBS2 130 of their interest in presence information associated with user@PBS1.com.
- FIGS. 8B and 8C illustrate processes 800 B and 800 C performed when the list of interoperable services is stored at or accessed by a foreign presence-based service, e.g., PBS1 120 .
- process 800 B includes actions ( 801 b and 802 b ) that are the same as actions ( 801 a and 802 a ) of FIG. 8A and, as such, are previously described above with respect to actions ( 801 a and 802 a ).
- PBS2 130 After authenticating user@PBS1.com, PBS2 130 recognizes that user@PBS1.com is associated with a foreign presence-based service, e.g., PBS1 120 , because of user@PBS1.com's domain ( 803 b ).
- PBS2 130 provides an indication of the authentication for user@PBS1.com to the foreign presence-based service that is associated with the user@PBS1.com's domain ( 804 b ). PBS2 130 optionally projects change in presence associated with user@PBS1.com to PBS2 subscribers ( 805 b ).
- the foreign presence-based service e.g., PBS1 120 accesses list of interoperable presence-based services ( 806 b ) and the foreign presence-based service consults its publication rules and publishes the information in a manner consistent with its publication rules to none, some, or all of the services on a list located at or accessed by the foreign presence-based service ( 807 b ).
- PBS2 130 may request the list from the foreign presence-based service, and may itself publish to none, some, or all of the services on the list after consulting PSB2 130 (or foreign-provided) publication rules as shown in FIG. 8C .
- FIG. 8C illustrates a process 800 C used by PBS2 130 to request a list of interoperable presence-based services (and optionally, publication rules) from the foreign interoperable presence-based service and to publishes to none, some, or all of the services on the list.
- Actions ( 801 c - 803 c ) of the process 800 C are similar to the actions ( 801 b - 803 b ) of the process 800 B, and, as such, are previously described with respect to actions ( 801 b - 803 b ).
- Process 800 C differs from process 800 B in that in process 800 C, PBS2 130 does not rely on PBS1 120 for publication. Instead, PBS2 130 requests the list of interoperable presence-based services (and, optionally, publication rules) from the foreign interoperable presence-based service ( 804 c ). PBS2 130 receives the list of interoperable presence-based services ( 805 c ), and PBS2 130 consults its publication rules (and/or rules provided) to provide presence information of user@PBS1.com to none, some or all services on the list ( 806 c ).
- FIGS. 9A-9C illustrate processes 900 A- 900 C, respectively, in which the foreign interoperable presence-based service (e.g., PBS1 120 ) is informed of change in presence of an online identity, user@PBS1.com, by virtue of having to authenticate user@PBS1.com.
- FIG. 9A illustrates process 900 A in which PBS2 130 solicits PBS1 120 to authenticate a computer operator using an online identity and to publish the presence information associated with the online identity.
- Process 900 A begins with client system 110 initiating communication with PBS2 130 using the online identity, user@PBS1.com ( 901 a ).
- PBS2 130 communicates with PBS1 120 , the presence-based system associated with the user@PBS1.com,s domain, to authenticate user@PBS1.com ( 902 a ).
- PBS2 130 may submit to PBS1 120 the online identity and the credentials associated therewith and may request PBS1 120 to carryout the authentication step, as shown by process 300 B of FIG. 3B .
- PBS1 120 then authenticates user@PBS1.com ( 903 a ).
- PBS2 130 may request the credentials information from PBS1 120 and PBS2 130 uses the credentials information to authenticate the online identity, as shown by process 300 C of FIG. 3C .
- PBS2 130 then regulates access to the client system based on the authentication.
- PBS2 130 also may project changes in presence experienced by the online identity to its subscribers.
- PBS1 120 accesses a list of interoperable presence-based services that is stored at PBS1 120 ( 904 a ). PBS1 120 consults its publication rules and publishes the presence information associated with the online identity to none, some, or all of the presence-based services on the list accordingly ( 905 a ). In one implementation, PBS1 120 does not publish the change in presence to PBS2 130 because PBS2 130 has already projected this information to its subscribers.
- the list of interoperable services is not stored at PBS1 120 (or at least not relied upon from PBS1 120 ), and PBS1 120 either requests the list from PBS2 130 or provides PBS2 130 with authentication information so that PBS2 130 can publish the change in presence to one or more interoperable services.
- FIG. 9B illustrates process 900 B in which PBS1 120 requests the list from PBS2 130 and PBS1 120 publishes to none, some, or all of the interoperable presence-based services that are on the list in a manner consistent with PBS1 120 publication rules.
- Process 900 B includes actions ( 901 b - 903 b ), which are the same as actions ( 901 a - 903 a ) and, as such, are previously described with respect to actions ( 901 a - 903 a ).
- Process 900 B differs from process 900 A in that in process 900 B, PBS1 120 requests a list of interoperable presence-based services from PBS2 130 ( 904 b ).
- PBS2 130 provides the list to PBS1 120 ( 905 b ), and PBS1 120 publishes the presence information associated with the online identity to none, some, or all the services on the list consistent with PBS1 120 publication rules ( 906 b ).
- PBS1 120 may access PBS2 130 publication rules and publish the change in presence to none, some, or all of the interoperable presence-based services that are on the list in a manner consistent with PBS2 130 publication rules.
- Process 900 C includes actions ( 901 c - 903 c ), which are the same as actions ( 901 a - 903 a ) and, as such, are previously described with respect to actions ( 901 a - 903 a ).
- Process 900 C is different from processes 900 A and 900 B because, in process 900 C, PBS1 120 provides an indication of authentication to PBS2 130 ( 904 c ) and PBS2 130 accesses the list of interoperable presence-based services ( 905 c ) and publishes the presence information to none, some, or all the services on the list consistent with PBS2 130 publication rules ( 906 c ).
- the information that is published can include the online identity (e.g., e-mail address), reference ID, and identity of service through which login was achieved (e.g., PBS2), among other information.
- the online identity e.g., e-mail address
- reference ID e.g., e-mail address
- identity of service through which login was achieved e.g., PBS2
- FIG. 10 a table 1000 of such information may be maintained at all interoperable systems, or some subset or proxy therefor (e.g., in the domain services only). This information may be used to assist the services to keep track of the local presence of the online identity for purposes of delivering messages to the online identity as described further below.
- an open name space network 1100 is similar to that of FIG. 1 but includes a client mobile device 140 .
- the client mobile device 140 includes client software 142 configured for presence-based service associated with PBS1 120 or PBS2 130 .
- the presence-based systems 120 and 130 are configured to perform several operational acts to manage a situation in which online presence for an online identity (e.g., user@PBS1.com in keeping with previous examples) is already established by a first presence-based service and published by that service to a second presence-based service, and concurrently, the online identity is used to gain access to a second interoperable presence-based service at one of its client locations or devices or at another client location or device of the first interoperable presence-based service.
- an online identity e.g., user@PBS1.com in keeping with previous examples
- PBS2 130 authenticates and provides access to the computer operator as described previously. Thereafter, if a client mobile device 140 is used by the operator to submit user@PBS1.com while attempting to access PBS1 120 .
- PBS1 120 authenticates and provides access to the operator of the client mobile device.
- FIG. 12 illustrates a process 1200 in which the client system 110 submits a request to access PBS2 130 using an online identity, user@PBS1.com ( 1210 ).
- PBS2 130 requests authentication credentials from the client system 110 ( 1211 ).
- the operator of the client system 110 provides the credentials, which are submitted to PBS2 130 ( 1212 ).
- PBS2 130 Upon receiving the credentials, PBS2 130 submits the credentials (and online identity) to PBS1 120 ( 1213 ). PBS1 120 authenticates user@PBS1.com and notifies PBS2 130 that it has authenticated user@PBS1.com ( 1214 ). In response, PBS2 130 enables the client system 110 to access PBS2 130 using user@PBS1.com ( 1215 ).
- the client mobile device 140 requests access to PBS1 120 using the same online identity (e.g., user@PBS1.com) ( 1216 ).
- PBS1 120 requests credentials from the client mobile device 140 ( 1217 ), and the operator of the client mobile device 140 provides the credentials, which are submitted to PBS1 120 .
- the login server 122 authenticates the online identity and enables the client mobile device 140 to access PBS1 120 using the online identity ( 1219 ).
- Process 1300 A shown by FIG. 13A while similar in some respects to the process 1200 of FIG. 12 , provides a more detailed example of authenticating and authorizing the client system 110 to access PBS2 130 using the online identity, user@PBS1.com.
- Process 1300 A includes actions ( 1310 a - 1325 a ) which are the same as actions ( 310 c - 325 c ) described with respect to process 300 C of FIG. 3C . As such, the actions ( 1310 a - 1325 a ) of process 1300 A are not described here in further detail. Referring to FIG.
- process 1300 A continues with PBS2 130 publishing presence information to one or more interoperable presence-based services (e.g., PBS1 120 ) ( 1327 a ).
- PBS1 120 receives publication of the presence information of the online identity ( 1328 a ).
- this may enable PBS1 120 to inform its subscribers of the presence information.
- PBS1 120 and PBS2 130 may increment a counter or update a table in order to keep track of the number of times (and specifics therefor) the online identity is used to log into one or more presence-based services or devices and device types ( 1329 a and 1330 a ).
- a process 1400 is similar in some respects to the process 1200 of FIG. 12 , but provides a more detailed example of authenticating and authorizing the client mobile device 140 to access PBS1 120 using the online identity, user@PBS1.com.
- Process 1400 begins with the client mobile device 140 submitting a request to access presence-based service 124 offered by PBS1 120 ( 1410 ).
- the request includes the online identity, user@PBS1.com.
- the operator of the client mobile device 140 uses the client software 142 associated with the presence-based service 124 to submits its request.
- PBS1 120 receives the request ( 1411 ) and, in response, requests credentials for user@PBS1.com ( 1412 ).
- the client mobile device 140 receives the request for credentials and requests the credentials from the operator of the client mobile device 140 ( 1413 ).
- the operator of the client mobile device 140 provides the credentials, which are submitted to PBS1 120 ( 1414 ).
- PBS1 120 receives the credentials ( 1415 ) and authenticates user@PBS1.com ( 1416 ). Additionally, PBS1 120 may recognize PBS2 130 's past publication of presence information for user@PBS1.com by consulting its table or counter ( 1417 ). After detecting past publication of presence for the online identity (e.g., by consulting its table or counter), PBS1 120 records the local presence of the user@PBS1.com by incrementing its counter or adding a new row to its table ( 1418 ). PBS1 120 optionally projects the change in presence to PBS1 120 subscribers ( 1419 ), and/or optionally publishes the change in presence to other services such as the presence-based service of PBS2 130 ( 1420 ).
- PBS1 120 chooses to publish the change in presence to PBS2 130 , then PBS2 130 receives publication of change in presence associated with user@PBS1.com ( 1421 ) and increments its counter or updates its table to record the presence of user@PBS1.com at PBS1 120 ( 1422 ).
- PBS1 120 may publish full attribution or limited attribution of changes in presence, as shown by process 1500 .
- Process 1500 begins with PBS1 120 receiving a request from the client mobile device 140 to access PBS1 120 using the online identity, user@PBS1.com ( 1510 ).
- PBS1 120 requests for credentials from the client mobile device 140 and receives credentials from the client mobile device 140 ( 1512 ).
- PBS1 120 authenticates user@PBS1.com ( 1513 ) and recognizes past publication of change in presence associated with user@PBS1.com by consulting its table or counter ( 1514 ).
- PBS1 120 records local presence of user@PBS1.com by incrementing its counter or updating its table ( 1515 ).
- PBS1 120 determines whether to project attributes to PBS1 120 subscribers ( 1516 ). For example, this may include showing to the subscribers that user@PBS1.com is now available on the client mobile device 140 . Based on this determination, PBS1 120 either projects the presence information to its subscriber ( 1517 ) or it does not ( 1518 ). PBS1 120 determines whether to publish the presence information to another interoperable presence-based system (e.g., PBS2 130 ) ( 1519 ). Based on a positive determination, PBS1 120 either publishes a full attribution ( 1522 ) or a limited attribution ( 1523 ).
- PBS2 130 another interoperable presence-based system
- the limited attribution publication of presence information may include publishing the new presence of the online identity without the indication of the client device the operator used to log into the PBS1 presence-based service 122 .
- the full attribution publication of the presence information may include publishing the new change in presence of the online identity and the identity of the client device the operator used to access the PBS1 presence-based service 122 .
- FIGS. 16A and 16B illustrate an example of a table 125 stored in presence-based service of PBS1 120 .
- a table 125 includes information such as an online identity (e.g., e-mail address), identity of the service through which login was achieved, identity of a client device the operator used to access the service, and duration of online presence by the online identity.
- a table 125 includes a counter and a list of online identities. For instance, the counter shows that one or more client devices uses an online identity, user@PBS2.com, multiple times to gain access to one or more interoperable presence-based services.
- PBS1 120 and PBS2 130 may be configured to utilize information within these tables for several reasons or in various contexts.
- this information may be used to track the past publication of presence information corresponding to the online identity, and to determine whether a new publication is necessary when the online identity is used to again log into one or more presence-based interoperable services or devices.
- this information may be used to track the number of times the online identity is used to log into one or more different interoperable services so that log off from less than all of the services or device types does not cause premature perception of a complete loss of online presence.
- updating the table with the information such as the online identity and service of login allows the interoperable services to easily determine whether or where to send traffic that is directed from their subscribers to the online identity as described further below.
- the PBS1 presence-based service 124 also includes other attributes database 127 .
- the other attributes database 127 keeps track of other presence information. For example, FIG. 16C reveals that a user@PBS1.com is logged into PBS1 120 via the client system 110 , and the user@PBS1.com does not have an active presence at the client system 110 , e.g., the user@PBS1.com is idle. Similarly, FIG. 16C reveals that user@PBS1 is also logged into PBS1 120 via the client mobile device 140 , and the user@PBS1.com is away from the client mobile device 140 .
- the PBS1 presence-based service 124 may project this information to its subscribers. Additionally, the PBS1 presence-based service 124 may publish this information to other interoperable presence-based services.
- PBS1 120 has several options for delivering traffic to the online identity, as shown by processes 1700 A- 1700 C of FIGS. 17A-17C . More specifically, for purposes of description, it is assumed that the presence-based service 124 offered by PBS1 120 recognizes the online identity as having presence directly through PBS1 120 and indirectly through PBS2 130 , e.g., via a communication from PBS2 130 to PBS1 120 that results from interoperability between the systems in response to the user having signed into PBS2 130 (shown in FIG. 13A-13B ).
- PBS1 120 has options of (1) sending the traffic directly, meaning through the PBS1 presence-based service 124 , to the online identity such that the traffic is received by the online identity at client devices through which the user logged directly into PBS2 130 (e.g., the client mobile device in FIG. 12 ), as shown in FIG. 17A ; (2) sending the traffic indirectly, meaning through PBS2 130 , to the online identity such that the traffic is received by the online identity at client devices through which the user logged indirectly into PBS1 120 (e.g., the client system 110 in FIG. 12 ), as shown in FIG.
- FIG. 17A illustrates a process 1700 A that is used by PBS1 120 to send the traffic from PBS1 120 subscribers directly to the online identity such that the traffic is received by the online identity at a client device (e.g., the client mobile device 140 ) through which the user logged directly into PBS1 120 .
- Process 17 A begins with PBS1 120 receiving, from at least one of its subscribers, traffic directed to the online identity, user@PBS1.com ( 1710 a ).
- PBS1 120 By consulting a table or a counter, PBS1 120 recognizes online presence of user@PBS1.com at PBS1 120 and one or more other interoperable presence-based systems (e.g., PBS2 130 ) ( 1711 a ).
- the table may include the either of the example tables 125 shown in FIGS. 16A and 16B , or some combination thereof.
- PBS1 120 consults PBS1 120 traffic delivery rules to determine where to direct the traffic ( 1712 a ).
- the traffic delivery rules may indicate delivery of traffic only through PBS1 120 ( 1713 a ).
- PBS1 120 consults its table to determine which client device is being used to access PBS1 120 ( 1714 a ).
- PBS1 120 recognizes the online presence of the online identity at the client mobile device 140 through PBS1 120 directly ( 1715 a ) and, according to the traffic delivery rules, sends the traffic to the online identity at the client mobile device 140 ( 1716 a ).
- the client mobile device 140 receives the traffic ( 1717 a ). As such, in this implementation, only the client mobile device 140 receives the traffic.
- FIG. 17B illustrates an example of a process 1700 B that is used by PBS1 120 to send the traffic from PBS1 120 indirectly to the online identity such that the traffic is received by the online identity at a client device (e.g., the client system 110 of FIG. 12 ) accessing PBS2 130 .
- Process 1700 B includes actions ( 1710 b - 1713 b ), which are the same as actions ( 1710 a - 1712 a ) illustrated in process 1700 A of FIG. 17A and, as such, are previously described with respect to actions ( 1710 a - 1712 a ).
- Process 1700 B is different from process 1700 A because in process 1700 B the traffic delivery rules instruct PBS1 120 to direct the traffic only through PBS2 130 ( 1713 b ), whereas in process 1700 A the traffic delivery rules instruct PBS1 120 to direct the traffic only through PBS1 120 .
- PBS1 120 therefore consults its table to determine which client device is being used to access PBS2 130 ( 1714 b ).
- PBS1 120 recognizes the online presence of the online identity at the client system 110 through PBS2 130 ( 1715 b ), and sends the traffic to PBS2 130 ( 1716 b ).
- PBS2 130 receives the traffic ( 1717 b ) and forwards the traffic to the online identity at the client system 110 ( 1718 b ). As such, in this implementation, only the client system 110 receives the traffic ( 1719 b ).
- FIG. 17C illustrates an example of a process 1700 C that is used by PBS1 120 to send the traffic to client devices accessing both PBS1 120 and PBS2 130 using the online identity, such that the traffic is received at a client device (e.g., the client mobile device 140 ) that leverage PBS1 120 and a client device (e.g., the client system 110 ) that leverage PBS2 130 .
- the actions ( 1710 c - 1712 c ) of process 1700 C is the same as actions ( 1710 a - 1712 a ) and, as such, are not described here in more detail.
- the traffic delivery rules instruct PBS1 120 to direct traffic through all interoperable presence-based services (e.g., PBS1 120 and PBS2 130 ).
- PBS1 120 consults its table to determine which client devices are accessing PBS1 120 and PBS2 130 ( 1714 c ).
- PBS1 120 recognizes online presence of the online identity at the client mobile device 140 via PBS1 120 and at the client system 110 via PBS2 130 ( 1715 c ).
- PBS1 120 sends the traffic to the online identity at the client mobile device ( 1716 c ) and submits the traffic to PBS2 120 for delivery to the client system 110 ( 1717 c ).
- PBS2 130 receives the traffic ( 1718 c ) and forwards the traffic to the online identity at the client system 110 ( 1719 c ). Therefore, in this implementation, the traffic is delivered to both the client system 110 and the client mobile device 140 ( 1720 c and 1721 c ).
- a traffic originates from a PBS2 130 subscriber, it may be routed directly to user@PBS1.com via PBS2 130 . Additionally, PBS2 130 may inform PBS1 120 of such communication. In particular, PBS2 130 may inform PBS1 120 that a traffic was communicated to its online identity. The information may include the online identity, identity of the sender and the time and date the traffic was sent to user@PBS1.com. In this manner, PBS1 120 is enabled to keep track of the traffic that is being sent to user@PBS1.com regardless of whether the traffic delivery rules specify that the traffic should go through PBS1 120 and/or PBS2 130 to reach user@PBS1.com.
- a process 1800 is shown in which the client system 110 and the client mobile device 140 uses an online identity, user@PBS1.com, to access a presence-based service 134 of PBS2 130 .
- Process 1800 begins with the client system 110 requesting access to PBS2 130 using user@PBS1.com ( 1810 ).
- a login server 132 of PBS2 130 authenticates the online identity at client system 110 ( 1811 - 1815 ), and a presence-based service 134 of PBS2 130 projects presence information of the online identity at the client system 110 to PBS2 130 subscribers.
- the presence-based service 134 of PBS2 130 also publishes the changes in presence of the online identity at the client system 110 to PBS1 120 consistent with PBS2 130 publication rules ( 1816 ).
- PBS1 120 may project the changes in presence to its subscribers.
- the client mobile device 140 requests access to PBS2 130 using the same online identity, user@PBS1.com ( 1817 ).
- the login server 132 of PBS2 130 authenticates the online identity ( 1818 - 1820 ), and the presence-based service 134 of PBS2 130 projects changes in presence of the online identity at the client mobile device 140 to PBS2 130 subscribers.
- the presence-based service 134 of PBS2 130 also publishes the changes in presence of the online identity at the client mobile device 140 to PBS1 120 consistent with PBS2 130 publication rules ( 1821 ).
- a PBS1 120 subscriber may send a message to user@PBS1.com.
- the message may be configured for limited traffic delivery according to the traffic delivery rules hosted by PBS1 120 .
- FIGS. 19A-19C show a few methods for communicating the traffic delivery rules hosted by PBS1 120 to PBS2 130 .
- process 1900 A may be used by PBS1 120 to communicate all the traffic delivery rules to PBS2 130 .
- Process 1900 A begins with PBS1 120 receiving a message directed to the online identity from one or more PBS1 120 subscribers ( 1910 a ).
- PBS1 120 consults its table to determine local presence of the online identity ( 1911 a ) and recognizes presence of the online identity at the client system 110 and the client mobile device 140 through PBS2 130 ( 1912 a ).
- PBS1 120 accesses traffic delivery rules for delivering the message ( 1913 a ) and submits the rules to PBS2 130 ( 1914 a ).
- PBS1 120 submits the message to PBS2 130 ( 1916 a ).
- PBS2 130 receives the rule(s) and the message from PBS1 120 ( 1915 a and 1917 a ), and delivers the message to the online identity at the client devices 110 and 140 consistent with the rules ( 1918 a ).
- PBS1 120 may communicate a subset of the rules based on the message or type of services into which the online identity is logged in, as shown by process 1900 B.
- the actions ( 1910 b - 1913 b ) of process 1900 B are the same as actions ( 1910 a - 1913 a ) of process 1900 A, and, as such, they are not described here in more detail.
- Process 1900 B also includes PBS1 120 submitting a subset of rules based on the message and/or the device type used to access the presence based service ( 1914 b ) and separately submitting the message to PBS2 130 ( 1916 b ).
- PBS2 130 receives the subset of the rules and the message ( 1915 b and 1917 b ) and delivers the message to the online identity at the client devices 110 and 140 consistent with the rules ( 1918 b ).
- PBS1 120 may attach the rules to the message ( 1914 c ) and send the rules with the message to PBS2 130 ( 1915 c ).
- PBS2 130 receives the message ( 1916 c ), extracts the rules from the message ( 1917 c ), and sends the message to the online identity consistent with the rules ( 1918 c ).
- the actions ( 1910 c - 1913 c ) of process 1900 C are the same as actions ( 1910 a - 1913 a ) of process 1900 A and, as such, they are not described here in more detail.
- PBS1 120 may deliver the rules at the time it returns an indication of authentication to PBS2 130 for the online identity, as shown in FIG. 12 .
- rules hosted by PBS1 120 may include delivery of the traffic to user@PBS1.com according to the particular client device used to access the presence-based service 134 of PBS2 130 (e.g., sending the traffic to the online identity at the client system 110 ).
- the traffic delivery rules are first communicated to PBS2 130 according to one of the several methods described with respects to FIGS. 19A-19C .
- PBS2 130 consults the traffic delivery rules and consistent with the rules sends the message to user@PBS1.com at the client system 110 .
- the rules may require the delivery of the message to user@PBS1.com logged in to the PBS2 presence-based service 134 via the client mobile device 140 .
- user@PBS1.com logged in via the client system 110 does not receive the message.
- an online identity accesses a first presence-based service (e.g., PBS2 130 ) that is not associated with the domain of the online identity.
- the online identity may have a connection to a second presence-based service (e.g., PBS3) through the first presence-based service.
- PBS3 a second presence-based service
- user@PBS1.com receives, at the first presence-based service, a message from a PBS3 subscriber.
- the message may originate from PBS3 and may be delivered to PBS2 130 .
- PBS2 130 may need to access traffic delivery rules associated with the online identity in order to regulate delivery of the message to the online identity based on the traffic delivery rules.
- PBS2 130 requests the traffic delivery rules from a third presence-based service.
- the third presence-based service e.g., PBS1 120
- the third presence-based service may be a centralized service that includes traffic delivery rules for online identities (e.g., at all interoperable presence-based services).
- PBS2 130 instead of requesting the traffic delivery rules from the third presence-based service, PBS2 130 merely reports to the third presence-based service that the online identity has accessed PBS2 130 and in response, the third presence-based service publishes the traffic delivery rules to PBS2 130 .
- PBS1 120 may publish the changes to PBS2 130 .
- PBS2 130 regulates delivery of the traffic based on the traffic delivery rules.
- FIG. 20 illustrates a traffic delivery rules database 2000 hosted by a presence-based system, e.g., PBS1 120 .
- the traffic delivery rules may be customized for an individual.
- the traffic delivery rules may be customized for the operator of the client system using the online identity and, as such, the traffic delivery rules govern receipt of the message based on preferences of the online identity or the first presence-based service.
- the traffic delivery rules may be customized for a sender of the message and, as such, the traffic delivery rules regulate delivery of the message to the online identity based on preferences of the sender of the message or a presence-based service associated with the sender of the message.
- the traffic delivery rules database 2000 may include rules for delivery of the traffic through one or more presence-based systems, as noted with respect to FIGS. 17A-17C .
- the traffic delivery rules database 2000 may include rules for delivery of traffic to a selected subset of online identities for one or more interoperating presence-based systems.
- the traffic delivery rules database 2000 may include rules for delivery of the traffic based on the client device the operator of the online identity uses to log into the PBS2 presence-based service 134 , as noted above.
- the traffic delivery rules database 2000 may include rules for delivery of the traffic to one or more client devices at a particular time of day such that the traffic is received at the devices that the operator uses at a particular time of day. For example, as shown in FIG.
- the traffic is sent to the online identity at the client mobile device between 7 am-9 am because the operator using the online identity is likely to be on his or her way to work during that time.
- the traffic delivery rules database 2000 includes rules for delivery of the traffic to the client devices at which the online identity has an active presence according to presence information stored in the PBS1 presence based service 124 as shown in FIG. 16C .
- the message may be delivered to the online identity at the client devices in which the online identity is not idle, away, or hidden.
- the traffic delivery rules may include instructions for determining whether the online identity has a direct presence at a first presence-based service from which the message originates (in keeping with the above example PBS1 120 with respect to FIGS. 19A-19C ), and in the absence of such direct presence, the traffic delivery rules include instructions for delivering the message to the online identity through a second presence-based service (e.g., PBS2 130 ). If such direct presence is determined to exists, the traffic delivery rules include instructions for delivering the message to the online identity through the first instant messaging service (e.g., PBS1 120 ).
- the operator of the client system 110 has to directly login into the first presence-based service.
- the traffic delivery rules database 2000 may also include rules regarding the priority of the message. For instance, if the message is urgent the traffic delivery rules may instruct the PBS2 presence-based service 134 to send the traffic to the online identity at all client devices.
- EarthLink® and AOL® internet service providers represent PBS1 120 and PBS2 130 , respectively
- EarthLink® IM and AOL® IM represent the presence-based services for PBS1 120 and PBS2 130 , respectively.
- a client system operator using user@EarthLink.com logs into EarthLink® IM service through EarthLink® IM client at the client system. Later, but concurrently, the operator using user@EarthLink.com logs into AOL® IM service through an AOL® IM client at a client mobile device.
- AOL® recognizes the online identity as having presence directly through AOL® IM service and indirectly through EarthLink® IM service, e.g., via communications from EarthLink® to AOL® that results from interoperability between the services in response to user@Earthlink.com having logged into the EarthLink® IM service (shown in FIG. 13A-13B ).
- AOL® may have options of (1) sending the traffic through AOL®, such that the traffic is received by user@EarthLink.com at client devices through which user@EarthLink.com logged directly into AOL® IM service (e.g., the client mobile device in the scenario described above), (2) sending the traffic through EarthLink,® such that the traffic is received by user@EarthLink.com at client devices through which the user@EarthLink.com logged directly into EarthLink® IM service (e.g., the client system in the scenario described above), and (3) sending the traffic to each of the AOL® and EarthLink®, such that it is received at clients for both services through which the user logged in.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Computer Hardware Design (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Tourism & Hospitality (AREA)
- Computer Security & Cryptography (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
- This application claims priority under 35 USC §119(e) to U.S. Provisional Patent Application Ser. No. 60/737,755, filed on Nov. 18, 2005, the entire contents of which are hereby incorporated by reference.
- This disclosure relates to using an online identity to access one or more interoperable presence-based services.
- According to one general aspect, a method according to the present application includes enabling access to a first instant messaging service using an online identity that is associated with a second instant messaging service, accessing a profile that indicates at least one other instant messaging service is to be provided with presence information regarding the use of the online identity to access the first instant messaging service, and providing the other instant messaging service with the presence information regarding the use of the online identity to access the first instant messaging service.
- Implementations of the above general aspect may include one or more of the following features. For example, enabling access to the first instant messaging service using the online identity may comprise communicating with the second instant messaging service to authenticate the online identity. The communicating with the second instant messaging service to authenticate the online identity may include communicating with the second instant messaging service to authenticate the online identity without soliciting a user of the online identity.
- Alternatively or additionally, enabling access to the first instant messaging service using the online identity may comprise communicating with the first instant messaging service to authenticate the online identity such that the first instant messaging service authenticates the online identity and provides the other presence other instant messaging service with the presence information associated with the online identity. Alternatively or additionally, enabling access to the first instant messaging service using the online identity may comprise sending an authentication ticket to the client device from the second instant messaging service. Alternatively or additionally, enabling access to the first instant messaging service using the online identity may comprise receiving a request for access to the first instant messaging service from a client device, the request including the online identity, authenticating the online identity, and providing the client device with access to the first instant messaging service upon authentication of the online identity.
- Implementations of the above general aspect may include one or more of the following features. Accessing the profile may include sending a request for publication rules from the first instant messaging service to the second instant messaging service and receiving the publication rules at the first instant messaging service from the second instant messaging service. Alternatively or additionally, accessing the profile may comprise sending a request for publication rules from the second instant messaging service to the first instant messaging service and receiving the publication rules at the second instant messaging service from the first instant messaging service. Alternatively or additionally, accessing the profile may comprise accessing a locally stored profile. The profile may include more than one instant messaging service, one of which is the first instant messaging service. The at least one other instant messaging service may include the second instant messaging service. The online identity may be expressed using a combination of a username and a domain name.
- Alternatively or additionally, accessing the profile may include accessing a list of instant messaging services to be provided with the presence information. Alternatively or additionally, accessing the profile may include accessing a set of publication rules. The profile may be associated with the online identity. The profile further may identify an identity of the instant messaging service that is to be provided with the presence information regarding the user of the online identity to access the first instant messaging service. Determining, from the profile, the other instant messaging service that is to be provided with presence information regarding the use of the online identity to access the first instant messaging service.
- Providing the other instant messaging service with the presence information may comprise sending the presence information from the first instant messaging service to the other instant messaging service. Alternatively or additionally, providing the other instant messaging service with the presence information may comprise sending the presence information from the second instant messaging service to the other instant messaging service.
- Implementations of the above general aspect may also include one or more of the following features. Providing the presence information to subscribers associated with the first instant messaging service that have subscribed to the presence information. Providing the presence information to subscribers may include providing the presence information to subscribers by the first instant messaging service independent from other instant messaging services. Providing the presence information to subscribers may include providing the presence information to subscribers by the first instant messaging service in response to or at a direction of another instant messaging service. The presence information may include one or more of the following: logging in, logging off, going idle, or going away. Determining that the online identity is associated with the second instant messaging service may include determining that the online identity is registered with the second instant messaging system.
- According to another general aspect, a method according to the present application includes receiving a request to access a first instant messaging service, the request including an online identity and determining that the online identity is associated with a second instant messaging service. The method also includes communicating with the second instant messaging service to enable authentication of the online identity and upon authentication of the online identity, enabling access to the first instant messaging service.
- Implementations of the above general aspect may include one or more of the following features. For example, the online identity may include a username and a domain name. Determining that that the online identity is associated with the second instant messaging service may include accessing the domain name included in the online identity and determining that the online identity is associated with the second instant messaging service based on the accessed domain name. Accessing the domain name may identify that the online identity is associated with the second instant messaging service. Determining that the online identity is associated with the second instant messaging service based on the accessed domain name may include referencing a table to determine that the online identity is associated with the second instant messaging service, wherein the table associates the accessed domain name with the second instant messaging service.
- Alternatively or additionally, determining that the online identity is associated with the second instant messaging service may include determining that the online identity is associated with an account at the second instant messaging service. Alternatively or additionally, determining that the online identity is associated with the second instant messaging service may include determining that the online identity is registered with the second instant messaging service.
- Additionally, the request also may include credentials associated with the online identity. Receiving the request to access the first instant messaging service may include receiving, at the client system, the request from a user. Determining that the online identity is associated with the second instant messaging service may include determining, at the client system, that the online identity is associated with the second instant messaging service and communicating with the second instant messaging service to authenticate the online identity may include sending, from the client system, the online identity and credentials to the second instant messaging service and receiving, at the client system, an authentication ticket from the second instant messaging service. Enabling access to the first instant messaging service may include sending, from the client system, the authentication ticket to the first instant messaging service.
- The implementations of the above general aspect may also include sending the authentication ticket from the first instant messaging service to the second instant messaging service, requesting verification of the authentication ticket from the second instant messaging service, and receiving a verification message from the second instant messaging service.
- Determining that the online identity is associated with the second instant messaging service may include determining that the online identity is associated with the second instant messaging service based on the online identity or the received credentials. Receiving the request to access the first instant messaging service may include receiving, from the client system, the request at the first instant messaging service, determining that the online identity is associated with the second instant messaging service may include determining, at the first instant messaging service, that the online identity is associated with the second instant messaging service, and communicating with the second instant messaging service may include sending an authentication request from the first instant messaging service to the second instant messaging service, and in response to sending the authentication request, receiving, at the first instant messaging service, an indication of authentication from the second instant messaging service; and enabling access to the first instant messaging service may include enabling the client system to access the first instant messaging service. The authentication request may include the online identity and the received credentials.
- Implementations of the above general aspect may also include storing the received credentials to enable future authentication of the online identity without sending the authentication request to the second instant messaging service. Receiving the request to access the first instant messaging service may include receiving, from a client system, the request at the first instant messaging service and determining that the online identity is associated with the second instant messaging service may include determining, at the first instant messaging service, that the online identity is associated with the second instant messaging service. Communicating with the second instant messaging service may include requesting, at the first instant messaging service and from the second instant messaging service, credentials associated with the online identity, in response to the request, receiving the requested credentials associated with the online identity at the first instant messaging service from the second instant messaging service, comparing, at the first instant messaging service, the requested credentials to the received credentials from the client system, determining, at the first instant messaging service, whether the requested credentials matches the received credentials from the client system, and authenticating the online identity, at the first instant messaging service, if the requested credentials match the received credentials from the client system. Enabling access to the first instant messaging service may include enabling the client system to access the first instant messaging service.
- Implementations of the above general aspect may also storing the requested credentials to enable future authentication of the online identity without requesting the credentials associated with the online identity from the second instant messaging service. Enabling access to the first instant messaging service may include enabling the online identity to share its presence information with at least one other online identity and send an receive instant messages from the at least one other online identity.
- Implementations of the described techniques may include hardware, a method or process, or computer software on a computer-accessible medium. The details of one or more implementations are set forth in the accompanying drawings and the description below. Other features will be apparent from the description and drawings, and from the claims.
- In another aspect, access to a first instant messaging service using an online identity is allowed. A profile associated with the online identity is accessed and the profile is updated to indicate that the online identity is currently being used to access the first instant messaging service. A message is received from another instant messaging service at the first instant messaging service. The message indicates that the online identity is currently being used to access a second instant messaging service. In response to the message, the profile is updated to indicate that the online identity is currently being used to access the second instant messaging service.
- Implementations may include one or more of the following features. For example, allowing access to the first instant messaging service using the online identity may include receiving a request to access the first instant messaging service, the request including the online identity; determining that the online identity is associated with the second instant messaging service; and communicating with the second instant messaging service to authenticate the online identity.
- The online identity may be associated with the first instant messaging system or the second instant messaging system. The online identity may be expressed using a combination of a username and a domain name. Updating the profile to indicate that the online identity is currently being used to access the second instant messaging service may include updating a table to include an identity of the second instant messaging system. The table may be updated to include an identity of a client device accessing the second instant messaging service using the online identity. The table also may be updated to include the duration of time the online identity has been used to access the second instant messaging service.
- The other instant messaging service may include the second instant messaging service. Updating the profile may include updating a counter that indicates the number of times the online identity is used to access one or more instant messaging services. Updating the profile may include decrementing the counter if it is determined that the online identity has logged off from either the first instant messaging service or the second instant messaging service.
- A particular instant messaging service from which the online identity has logged off may be identified and the one or more instant messaging services may be notified that the online identity has logged off the particular instant messaging service. A client device from which the online identity has logged off may be identified and the one or more instant messaging services may be notified that the online identity has logged off the client device.
- Whether a value of the counter is equal to zero may be determined; and if so, the one or more instant messaging services may be notified of the online identity's complete loss of presence. Accessing the profile may include accessing a profile maintained by the first instant messaging service.
- In another aspect, a message directed to an online identity may be received at a first instant messaging service. It is determined that the online identity has a connection to the first instant messaging service through a second instant messaging service. At the first instant messaging service, traffic delivery rules are accessed. The traffic rules are configured to control delivering of the message and are customized for an individual. At least a portion of the traffic delivery rules and the message are sent to the second instant messaging service, thereby enabling the second instant messaging service to deliver the message to the online identity according to the traffic delivery rules.
- Implementations may include one or more of the following features. For example, the online identity may include a user name and a domain. It may be determined that the online identity is associated with the first instant messaging service. Determining that the online identity is associated with the first instant messaging service may include determining that the online identity is associated with an account at the first instant messaging service. Determining that the online identity is associated with the first instant messaging service may include determining that the online identity is registered with the first instant messaging service.
- The traffic delivery rules may be customized for the online identity and, as such, the traffic delivery rules may govern receipt of the message based on preferences of the online identity. The traffic delivery rules may be customized for a sender of the message and, as such, the traffic delivery rules may regulate delivery of the message based on preferences of the sender of the message.
- It may be determined that the online identity is associated with the second instant messaging service. Determining that the online identity is associated with the second instant messaging service may include determining that the online identity is associated with an account at the second instant messaging service. Determining that the online identity is associated with the second instant messaging service may include determining that the online identity is registered with the first instant messaging service.
- Accessing the traffic delivery rules may include accessing traffic delivery rules stored at the first instant messaging service. Accessing the traffic delivery rules may include accessing traffic delivery rules stored at the second instant messaging service. The traffic delivery rules may include instructions for delivery of the message through one or more instant messaging services. The traffic delivery rules may include instructions for delivery of the message based on a type of client device. The traffic delivery rules may include instructions for delivery of the message based on a particular time of day. The traffic delivery rules may include instructions for delivery of the message to a client device at which the online identity has an active presence. The traffic delivery rules may instructions for determining whether the online identity has a direct presence at the first instant messaging service and, in the absence of the direct presence at the first instant messaging service, delivering the message to the online identity through the second instant messaging service. The traffic delivery rules may include instructions for directing the first instant messaging service to deliver the message to the online identity through the second instant messaging service.
- Sending at least the portion of the traffic delivery rules and the message to the second instant messaging service may include appending the traffic delivery rules to the message and sending the message with the appended traffic delivery rules to the second instant messaging service. Sending at least the portion of the traffic delivery rules and the message to the second instant messaging service may include sending at least the portion of the traffic delivery rules to the second instant messaging service separate from submitting the message to the second instant messaging service. Sending at least a portion of the traffic delivery rules to the second instant messaging service separate from submitting the message to the second instant messaging service may include resubmitting the traffic delivery rules to the second instant messaging service as the traffic delivery rules changes.
- Sending at least the portion of the traffic delivery rules may include sending less than all of the traffic delivery rules to the second instant messaging service. Sending less than all of the traffic delivery rules to the second instant messaging service may include sending less than all of the traffic delivery rules customized for the online identity to the second instant messaging service. Sending less than all of the traffic delivery rules to the second instant messaging service may include sending less than all of the traffic delivery rules customized for a sender of the message to the second instant messaging service. The individual includes an operator of the online identity or a sender of the message.
- In another aspect, a message directed to an online identity may be received from a source at a first instant messaging service. Traffic delivery rules stored at a second instant messaging service are accessed. The traffic delivery rules are configured to control delivering of the message and are customized for an individual. The message is delivered to the online identity according to the traffic delivery rules.
- Implementations may include one or more of the following features. For example, it may be determined that the online identity has a connection to the first instant messaging service through a third instant messaging service. The third instant messaging service may access the traffic delivery rules stored at the second instant messaging service and delivers the message to the online identity according to the traffic delivery rules.
- The second instant messaging service may be informed of the online identity presence at the third instant messaging service and, in response, receiving, from the second instant messaging service, the traffic delivery rules that are customized for the online identity. The individual may include an operator of a client system using the online identity.
- Implementations of the described techniques may include hardware, a method or process, or computer software on a computer-accessible medium.
- The details of one or more implementations are set forth in the accompanying drawings and the description below. Other features will be apparent from the description and drawings, and from the claims.
-
FIG. 1 illustrates an open name space network that includes a client system connected to a first presence-based system (“PBS1”) and a second presence-based system (“PBS2”) via a network. -
FIGS. 2A-2B illustrate processes for allowing access to PBS1 with an online identity that is associated with the domain of PBS1. -
FIG. 3A illustrates a process for allowing access to PBS2 with an online identity that is not associated with the domain of PBS2. -
FIGS. 3B-3E illustrate various methods used by PBS2 to authenticate an online identity. -
FIG. 4A illustrates a graphical user interface used to enable input of an online identity and credentials. -
FIG. 4B illustrates a process for allowing an online identity, which is entered using the graphical user interface ofFIG. 4A and which includes an obscure domain, to access PBS2, which does not have interoperability with presence-based system associated with the obscure domain. -
FIG. 5 illustrates a registration form that an operator of a client device may complete in order to gain access to a presence-based system. -
FIG. 6 illustrates online presence of online identities at a presence-based service of PBS2. -
FIG. 7 illustrates, in more detail, the credentials database ofFIG. 3D that stores credentials of an online identity. -
FIGS. 8A-9C illustrate various methods for informing foreign presence-based services of presence information for an online identity. -
FIG. 10 illustrates an example of a table containing presence information. -
FIG. 11 illustrates an open name space network that includes a client mobile device. -
FIG. 12 illustrates a process for allowing a computer operator using an online identity to gain access to PBS2, and later, but concurrently, a client mobile device operator using the same online identity to gain access to PBS1. -
FIGS. 13A-13B illustrate processes for authenticating and authorizing the operator of the client system ofFIG. 12 to access PBS2, projecting changes in presence to PBS2 subscribers, and publishing the changes in presence to PBS1. -
FIG. 14 illustrates a process for authenticating and authorizing the operator of the client mobile device ofFIG. 12 to access PBS1, optionally projecting changes in presence to PBS1 subscribers, and optionally publishing changes in presence to PBS2. -
FIG. 15 illustrates a process for PBS1 to publish full attribution or limited attribution of changes in presence. -
FIG. 16A illustrates an example of a table storing presence information. -
FIG. 16B illustrates an example of a counter used to track when an online identity is used to access one or more presence-based systems. -
FIG. 16C illustrates an example of a table storing presence information. -
FIGS. 17A-17C illustrate various methods for delivering traffic to an online identity at multiple client devices through PBS1 and/or PBS2. -
FIG. 18 illustrates a process for allowing a computer operator using an online identity to gain access to PBS2, and later, but concurrently, a client mobile device operator using the same online identity to gain access to PBS2. -
FIGS. 19A-19C illustrate various methods for communicating traffic delivery rules hosted by PBS1 to PBS2. -
FIG. 20 illustrates an example of content within a traffic delivery rules database hosted by a presence-based system. - Referring generally to
FIG. 1 , aclient system 110 may attempt to access a first presence-based system (“PBS1”) 120 operated by a first administrative domain and a second presence-based system (“PBS2”) 130 operated by a second, different administrative domain, using an online identity that is included in an open name space. The open name space may include one or more electronic addresses that include a domain name. For example, the online identities may have the form username@domain. For instance, user@PBS1.com may be an online identity associated with PBS1 (e.g., registered with PBS1), with “user” being the username and “PBS1.com” being the domain name of PBS1. The online identity may or may not be a valid e-mail address for the user of the online identity. The user may therefore register an online identity that is used in other contexts (e.g., e-mail) or used with respect to at least one of several interoperating presence-based services, such that the user can leverage the open name space without seeking any additional online identities or abandoning the use of any existing online identities. That is, the user may register the online identity with one domain, and use that identity to access other domains. For instance, a user can use an existing e-mail address (which may also be registered as the online identity for an instant messaging (IM) service operated in the same administrative domain as the e-mail) as an online identity with respect to one or more other instant messaging services with which the user has not otherwise registered. The online identity simply reflects the e-mail address, including the user domain/source/origin through which the e-mail address was initially registered. In other words, a user may register an online identity with a first administrative domain that uses the identity as an e-mail address and as an identifier for presence-based services offered by the domain. The user then may use the online identity to access presence-based services operated by other, administrative domains, without specifically registering the online identity with those other administrative domains. For example, the user may have registered user@yahoo.com for e-mail and instant messaging operated by Yahoo!®. The user then may use the online identity user@yahoo.com to access the IM service operated by AOL® (referred to as AIM®). - Referring again to
FIG. 1 , an openname space network 100 includes aclient system 110,PBS1 120,PBS2 130, and anetwork 139. Theclient system 110 includesclient software 112 configured for presence-based service ofPBS1 120 orPBS2 130. The operator ofclient system 110 uses theclient software 112 to communicate withPBS1 120 or PBS2 130 via thenetwork 139.PBS1 120 includes alogin server 122 and a presence-basedservice 124. Similarly,PBS2 130 includes alogin server 132 and a presence-basedservice 134.Login server client system 110 to the presence-basedsystems service 124 and/or 134 allows theclient system 110 to communicate with other client systems connected to one or more interoperable presence-basedservices network 139. - For example,
PBS1 120 andPBS2 130, respectively, may represent AOL® and EarthLink® internet service providers, and presence-basedservices PBS1 120 andPBS2 130 may represent AOL® IM and EarthLink® IM infrastructures, respectively. In this situation, as will be described in greater detail below, an online identity identified as user@EarthLink.com is able to send and receive instant messages and share presence information with users of the AOL® IM service and the EarthLink® IM service, regardless of whether user@EarthLink.com is logged into clients of either or both of those services. -
FIGS. 2A-2B illustrateprocesses PBS1 120, associated with a domain of the online identity (e.g., user@PBS1.com logs into PBS1). In particular,FIG. 2A illustrates ageneral process 200A for allowing a client system to access a presence-based system, e.g., PBS1, using an online identity associated with the domain of PBS1.Process 200A begins with theclient system 110 initiating communication withPBS1 120 using an online identity, user@PBS1.com (201 a). To do so, theclient system 110 may use theclient software 112 configured for the presence-basedservice 124 ofPBS1 120. In particular, theclient system 110 may use theclient software 112 to submit the online identity and credentials associated therewith toPBS1 120.PBS1 120 is associated with the domain of the online identity because the online identity was initially registered with that presence-based system, and hence reflecting the domain name after the “®” symbol. - In response to the initiated communications, the
login server 112 ofPBS1 120 authenticates the client system (202 a) and communicates the authentication to the presence-basedservice 124. The presence-basedservice 124 projects changes in presence of user@PBS1.com to PBS1 120 users that subscribe to presence information for user@PBS1.com (203 a). This may include informing such subscribers that user@PBS1.com has logged into presence-basedservice 124 and is available to chat. - Referring to
FIG. 2B ,process 200B is similar in some respects to theprocess 200A ofFIG. 2A , but provides a more detailed example of authenticating and authorizing theclient system 110 to access PBS1 using the online identity, user@PBS1.com.Process 200B begins with theclient system 110 submitting a request to access presence-basedservice 124 offered by PBS1 120 (210 b). Theclient system 110 may use theclient software 112 configured for PBS1 to submit the request, which may include the online identity user@PBS1.com.PBS1 120 receives the request (211 b), and, in response,PBS1 120 requests credentials for user@PBS1.com (212 b). In a slightly modified scenario, theclient system 110 providesPBS1 120 with the credentials as part of the original request; thus, eliminating the need forPBS1 120 to solicit theclient system 110 for credentials. - The
client system 110 receives the request for the credentials (213 b) and requests the credentials from the operator of the client system 110 (214 b). In response, the operator of theclient system 110 provides the credentials (e.g., password), which are submitted to PBS1 120 (215 b).PBS1 120 receives the credentials (216 b) and authenticates user@PBS1.com (217). To authenticate user@PBS1.com, thelogin server 122 matches the online identity and password to the information stored in a credentials database. If such match exists, then thelogin server 122 enables theclient system 110 to access the presence-basedservice 124 offered by PBS1 120 (218 b and 219 b). The presence-basedservice 124 projects the online presence of the online identity to users ofPBS1 120 that have subscribed to such information (220 b) (e.g., list the online identity among their instant message contact list) or who make a specific request for knowledge that user@PBS1.com has logged into the presence-basedservice 124 offered byPBS1 120 and is available to chat. -
FIG. 3A illustrates aprocess 300A for allowing aclient system 110 to access a presence-based system, e.g.,PBS2 130, using an online identity that is not associated with the domain of PBS2 130 (e.g., user@PBS1.com logs into PBS2 130).Process 300A begins with theclient system 110 initiating communication withPBS2 130, which has interoperability with PBS1 120 (301 a). To do so, theclient system 110 may use theclient software 112 configured forPBS2 130. In particular, as part of initiating communications withPBS2 130, theclient software 112 may provide the online identity, e.g., user@PBS1.com, and associated password to alogin server 132 ofPBS2 130.PBS2 130 recognizes that the online identity is associated withPBS1 120 due to the domain name in the online identity. In one implementation,PBS2 130 consults a table that includes association between the domain names and the presence-based service associated therewith to identify the presence-based service (e.g., PBS1 120) that is associated with user@PBS1.com. In another implementation,PBS2 130 may provide the domain name to a domain name server to identity the presence-based service associated with user@PBS1.com. In response, the domain name server identifiesPBS1 120, resolves an IP address associated withPBS1 120, and provides this information to PBS2 130 to enablePBS2 130 to communicate withPBS1 120. -
PBS2 130 then initiates communication withPBS1 120, the presence-based system associated with the domain of user@PBS1.com, in order to authenticate user@PBS1.com (302 a). Upon authentication,PBS2 130 enables access by theclient system 110 to the presence-basedservice 134 ofPBS2 130. The presence-basedservice 134 projects the online presence of user@PBS1.com to users of PBS2 130 (303 a). As suggested with respect toFIGS. 2A-2B , the online presence is projected to users ofPBS2 130 that subscribe to such information (e.g., list the online identity among their instant message contact list) or who make a specific request for knowledge of user@PBS1.com's presence. Presence may also be reflected for aliases associated with the online identity, user@PBS1.com, which aliases may be accessed at either ofPBS1 120 orPBS2 130. -
FIGS. 3B and 3C , illustrate various processes used byPBS2 130 to authenticate an online identity, user@PBS1.com, as generally illustrated by the operation block (302 a) inFIG. 3A . In particular, inFIG. 3B ,PBS2 130 delegates the authentication of the online identity toPBS1 120. In contrast, inFIG. 3C ,PBS2 130 request authentication information fromPBS1 120 andPBS2 130 performs the authentication. -
Processes FIGS. 3B and 3C , while similar in some respects to process 300A ofFIG. 3A , each provide a more detailed example of authenticating and authorizing theclient system 110 to accessPBS2 130 using the online identity, user@PBS1.com.FIG. 3B illustrates aprocess 300B that enablesPBS2 130 to delegate authentication of user@PBS1.com toPBS1 120.Process 300B begins with theclient system 110 submitting a request to access presence-basedservice 134 offered byPBS2 130. Theclient system 110 may use theclient software 112 installed on thecomputer 110 and configured for presence-basedservice 134 to submit the request to access the presence-basedservice 134. The request may include the online identity, user@PBS1.com. -
PBS2 130 receives the request (311 b) and, in response, requests credentials associated with user@PBS1.com (312 b). Theclient system 110 receives the request for credentials (313 b) and requests the credentials from the operator of the client system 110 (314 b). The operator of theclient system 110 provides the credentials (e.g., password), which are submitted to PBS2 130 (315 b).PBS2 130 receives the credentials (316 b) and recognizes that user@PBS1.com and/or the credentials associated therewith is associated withPBS1 120. As noted above with respect toFIGS. 2A-2B ,PBS2 130 may recognize that user@PBS1.com is associated withPBS1 120 by referencing the domain name included in user@PBS1.com. To this end,PBS2 130 references the domain name appearing after the @ symbol to recognize the domain associated with user@PBS1.com. - Upon recognizing that user@PBS1.com is associated with
PBS1 120,PBS2 130 submits to PBS1 120 (or proxy thereof) the online identity and the received credentials, e.g., password, (318 b).PBS1 120 receives the online identity and the credentials (319 b), authenticates the online identity (320 b), and returns an indication of authentication to PBS2 130 (321 b). To authenticate user@PBS1.com,PBS1 120 may use thelogin server 122. Thelogin server 122 attempts to match user@PBS1.com and the credentials to stored information in its credentials database. If a match exists, thelogin server 122 returns the indication of the authentication toPBS2 130. -
PBS1 120 simply notifiesPBS2 130 of whether or not user@PBS1.com has been successfully authenticated (321 b).PBS2 130 receives this notification (323 b) and based on this information,PBS2 130 provides or denies access to theclient system 110 accordingly (324 b-325 b). If theclient system 110 is provided access,PBS2 130 projects presence information for user@PBS1.com to PBS2 130 subscribers who have subscribed to such information (327 b). Similarly, PBS1 may optionally project the presence information for user@PBS1.com to PBS1 120 subscribers who have subscribed to such information (322 b). - In a slightly modified scenario,
PBS2 130 may optionally store, within its credentials database, the credentials submitted with respect to user@PBS1.com and record an indication of whether or not such credentials were used to successfully authenticate user@PBS1.com (326 b). Thereafter, subsequent requests made on behalf of user@PBS1.com are handled without requiring input fromPBS1 120. In another variation of this scenario,PBS2 130 obtains certain information from the operator of theclient system 110 who is using an online identity corresponding to a different domain (e.g., user@PBS1.com). Specifically, for example,PBS2 130 requests completion of aregistration form 500 ofFIG. 5 , in response to whichPBS2 130 receives information such as date of birth, gender, country of origin, zip code, and alternate e-mail address. Theregistration form 500 also may elicit a credit card number for verifying the received information. After verification,PBS2 130 stores the online identity's credentials into its credentials database, conditioned (under one scenario) upon a determination that the operator of theclient system 110 meets a minimum age requirement, as shown inFIG. 7 . - Referring to
FIG. 7 , thelogin server 132 ofPBS2 130 includes alogin process 132 a and acredentials database 132 b. Thecredentials database 132 b stores credentials, e.g., e-mail address, password, age, and credit card information. Using these variations, subsequent attempts to use the online identity user@PBS1.com to log intoPBS2 130 can be handled using a simplified authentication process that more closely resembles that shown byFIGS. 2A-2B . - Diverging from each of the above scenarios,
PBS2 130 may be configured to itself perform the authentication of the online identity associated with other domains such as user@PBS1.com. That is,PBS2 130 does not have to delegate toPBS1 120 the authentication process. Instead, referring toFIG. 3C ,PBS2 130 may use aprocess 300C to request the credentials information fromPBS1 120, andPBS2 130 may use the credential information to perform the authentication process. -
Process 300C begins with actions (310 c-317 c) which are the same as actions (310 b-317 b), and, as such, are previously described with respect to actions (310 b-317 b).Process 300C differs fromprocess 300B because it includesPBS2 130 requesting credentials from PBS1 120 (318 c) and authenticating user@PBS1.com mail to: user@PBS1.com based on the received credentials (321 c). In particular,PBS2 130 submits a request for credentials associated with the online identity to PBS1 120 (318 c).PBS1 120 receives the request for credentials (319 c) and providesPBS2 130 with the credentials associated with the online identity (320 c).PBS2 130 receives the credentials and compares it to the credentials received from theclient system 110 to determine whether a match exists. If so,PBS2 130 authenticates the online identity (321 c). - Notably, the variations described above with respect to process 300B of
FIG. 3B also apply to process 300C ofFIG. 3C scenario, particularly since each involvesPBS2 130 performing an authentication step. Specifically referring toFIG. 3D , aprocess 300D may be used to identify whetherPBS2 130 previously stored the credentials information at the conclusion of theprevious processes Process 300D begins with theclient system 110 submitting a request to access presence-basedservice 132 offered by PBS2 130 (310 d). As noted above, theclient system 110 may use theclient software 112 configured forPBS2 130 to access the presence-basedservice 134. The request may include the online identity, user@PBS1.com. - The
login processor 132 a receives the request (311 d) and, in response, requests credentials for user@PBS1.com (312 d). Theclient system 110 receives the request for credentials (313 d) and requests the credentials from the operator (314 d). The operator of theclient system 110 provides the credentials, which are submitted to thelogin processor 132 a (315 d). Thelogin processor 132 a receives the credentials (316 d) and submits a request to accesscredentials database 132 b (317 d). Thecredentials database 132 b receives the request (318 d) and provides access to thelogin processor 132 a (319 d). Thelogin processor 132 a receives access (320 d) and compares the received credentials to those in the credentials database in order to verify the received credentials (321 d). Thelogin processor 132 a attempts to identify a match for the online identity and determine whether the online identity can log intoPBS2 130 without relying onPBS1 120. IfPBS2 130 had stored the information at the conclusion of theprevious processes FIGS. 3B and 3C , then thelogin processor 132 a authenticates the online identity using the information in thecredentials database 132 b. Otherwise, thelogin process 132 a relies onPBS1 120 for authentication in the manner as illustrated inFIGS. 3B and 3C . - Specifically, if the
login processor 132 a determines that no match exists (322 d), then thelogin processor 132 a relies onPBS1 120 in order to verify the received credentials. In particular, thelogin processor 132 a recognizes that user@PBS1.com is associated with PBS1 120 (323 d) and submits user@PBS1.com and the received credentials to PBS1 120 to enablePBS1 120 to authenticate user@PBS1.com and return a notification of authentication (324 d-327 d), similar to actions (318 b-323 b) described with respect to process 300B ofFIG. 3B . Alternatively, thelogin processor 132 a may submit a request to obtain credentials information fromPBS1 120 and perform the authentication itself (324-327 d), similar to actions (318 c-321 c) described with respect to process 300C ofFIG. 3C . - In another implementation, when an operator of the
client system 110 attempts to accessPBS2 130 using an online identity, user@PBS1.com,PBS2 130 recognizes that the online identity is associated with another presence-based system (e.g., PBS1 120) and instructs or redirects theclient software 112 to authenticate withPBS1 120 first. In particular,PBS2 130 redirects theclient software 112 to PBS1 120 for authentication.PBS1 120 then authenticates user@PBS1.com and generates an authentication ticket, whichPBS1 120 then sends to theclient software 112. The authentication ticket may be used by theclient software 112 to accessPBS2 130. As such, theclient software 112 presents the authentication ticket to PBS2 130 to gain access toPBS2 130. Upon receiving the authentication ticket,PBS2 130 validates the authentication ticket with PBS1120. If the authentication ticket is validated,PBS2 130 enables theclient system 110 to access PBS2 presence-basedservice 134. -
FIG. 3E illustrates an example of aprocess 300E that may be used to implant the above described techniques.Process 300E begins with theclient system 110 submitting a request to access presence-basedservice 134 offered by PBS2 130 (310 e). Theclient system 110 may use theclient software 112 configured forPBS2 130 to submit the request. In one example, theclient software 112 may provide an interface on theclient system 110 for enabling the operator to provide the online identity (and possibly credentials) to be submitted with the request. -
PBS2 130 receives the request (311 e) and identifies that user@PBS1.com is associated with PBS1 120 (312 e). To identify the domain with which user@PBS1.com is associated with, in one implementation,PBS2 130 references the domain name appearing after “@” symbol, which identifies the domain with which the online identity is registered. In a slightly different scenario,PBS2 130 requests that the computer operator identify which domain the online identity is registered. For example,PBS2 130 may instruct theclient software 112 to include a field (e.g., a domain name field) that solicits the computer operator for such information. - In either case, upon identifying that user@PBS1.com is associated with
PBS1 120,PBS2 130 redirects theclient software 112 to PBS1 120 for authentication (313 e). Theclient software 112 receives the redirection notice (314 e) and submits the request for authentication to PBS1 120 (315 e). In one implementation, to submit the request for authentication to PBS1 120, theclient software 112 may be modified to include, within its user interface, specific authentication fields associated withPBS1 120. In one example, the specific field may include a user name field and a password field, each of which carrying thePBS1 120 identifier, to inform the computer operator they are associated withPBS1 120. In another implementation, theclient software 112 may launch another user interface (e.g., a web page) associated withPBS1 120 and prompt the computer operator to complete the fields within the user interface. The computer operator may enter the online identity within one of the fields and submit it toPBS1 120. -
PBS1 120 receives the request for authentication (316 e) and requests credentials for user@PBS1.com (317 e). Theclient system 110 receives the requests for credentials and requests credentials from the computer operator (318 e). The computer operator provides the credentials (e.g., password), which are submitted to PBS1 120 (319 e). In a slightly modified scenario, the computer operator may submit the credentials along with the online identity thereby relievingPBS1 120 from having to request it. -
PBS1 120 receives the credentials (320 e) and authenticates user@PBS1.com by comparing the received online identity and password with the stored credentials within the credentials database (321 e). Upon authenticating user@PBS1.com,PBS1 120 generates an authentication ticket to enable theclient system 110 to access PBS2 130 (322 e) using the online identity user@PBS1.com.PBS 120 returns the authentication ticket to the client software 112 (323 e). Theclient software 112 receives the authentication ticket (324 e) and submits the ticket with the online identity to PBS2 130 (325 e). -
PBS2 130 receives the ticket (326 e) and requests, fromPBS1 120, validation of the ticket (327 e).PBS1 120 receives the request (328 e), validates the ticket and returns a notice of validation to PBS2 130 (329 e).PBS2 130 receives the notice of validation and allows theclient system 110 to accessPBS2 130 using the online identity user@PBS1.com (330 e and 331 e). - In a slightly modified scenario, the
client software 112 may be configured to automatically send the authentication request toPBS1 120 when the computer operator uses user@PBS1.com as an online identity to access PBS2 presence-basedservice 134. In this manner,process 300E may be modified such that instead of submitting the request toPBS2 130, theclient software 112 recognizes the online identity is associated withPBS1 120 and instead theclient software 112 sends the authentication request toPBS1 120. The modified process would continue with the remaining actions (318 e-331 e). In another implementation, after identifying that the online identity is associated withPBS1 120 and directing theclient software 112 toPBS1 120,PBS2 130 may instruct theclient software 112 to automatically send future authentication requests toPBS1 120. For example, theclient software 112 may be able to use different login modules, each one for a different system, andPBS2 130 may instruct theclient software 112 to use the module forPBS1 120. -
FIG. 4A illustrates agraphical user interface 400A used to enable input of an online identity and credentials therefor. Specifically, inFIG. 4A , an e-mail address is used as the online identity. In this case, a computer operator attempts to log intoPBS2 130 using the online identity user@xyz.com, which is associated with a domain (xyz.com) that is not associated withPBS2 130 or any of the presence-based systems with whichPBS2 130 has established interoperability. In response to such an attempt, and as illustrated byprocess 400B shown inFIG. 4B ,PBS2 130 elicits completion by the computer operator of a registration form, such as the one shown inFIG. 5 .Process 400B begins withclient system 110 submitting a request to access presence-basedservice 134 offered byPBS2 130 using the online identity user@xyz.com (410 b).PBS2 130 receives the request (411 b) and, in response, requests credentials for user@xyz.com (412 b). Theclient system 110 receives the request for credentials and requests the credentials from the operator of the client system 110 (413 b). The operator of theclient system 110 provides the credentials which are submitted to PBS2 130 (414 b). PBS2 receives the credentials (415 b) and submits a request for registration to the client system 110 (416 b). As part of submitting the request for registration,PBS2 130 may submit theregistration form 500 ofFIG. 5 to theclient system 110 for completion by the operator. - The
client system 110 receives the request for registration (417 b) and the operator completes the registration form, which is forwarded to PBS2 130 (418 b).PBS2 130 receives the completed registration form (419 b) and sends a verification e-mail to the online identity of the computer user and requests a reply to the e-mail (420 b). The operator of theclient system 110 receives the verification e-mail (421 b) and replies to the e-mail (422 b). OncePBS2 130 receives a reply e-mail (420 b),PBS2 130 allows theclient system 110 to access the presence-based service 134 (425 b and 426 b). That is,PBS2 130 conditions access by theclient system 110 upon receipt of a reply to the verification e-mail sent to the e-mail address entered by the computer operator as an online identity, as such a reply suggests valid operation by the computer operator of an account with the unassociated domain under the identified e-mail address. Similar to previous implementations,PBS2 130 may store information received during authentication concerning credentials of the online identity, user@xyz.com, and their validity, so that it does not have to seek assistance from other systems or user e-mail verification the next time access is sought by user@xyz.com to PBS2 130 (424 b). - At the conclusion of processes such as those illustrated by
FIGS. 2A-2B , 3A-3E, and/or 4B, or those leveraging the graphical user interfaces ofFIGS. 4A and 5 , online presence of the online identity, user@PBS1.com and/or user@xyz.com, may be reflected at the presence-based service into which a computer operator using the online identity logged in. Referring toFIG. 6 , an example of auser interface 600 illustrates online presence of the online identities, user@PBS1.com and user@xyz.com, at a presence-based service ofPBS2 130 into which operators using various online identities have logged in. More specifically, it shows presence by, among others, user@PBS1.com and user@xyz.com on a contact list of aPBS2 130 subscriber. Thus, thePBS2 130 subscriber may send messages to user@xyz.com and/or user@PBS1.com or receive messages from them. - In addition to the interoperability illustrated with respect to
FIGS. 2A-4B , which, among other things, enables authentication at a presence-based service based on information or processes at another presence-based service, presence information may be communicated from one such service to another to be made apparent to subscribers of the different services. In addition, communications similarly may be sent and received by subscribers of the different services, all irrespective of whether a computer user gains access to a presence-bases system using client software or hosted portals provided by the domain to which its online identity is associated or another different domain service. In this manner,PBS2 130 may be configured to communicate with other (e.g., foreign) interoperable presence-based services, e.g.,PBS1 120, associated with the domain of the online identity (user@PBS1.com in this example) and to inform these services of presence by the online identity through the PBS2 presence-basedservice 134, or changes thereto, e.g., log in, log off, idle, and away. There are many ways for informing the foreign presence-based services of the change in presence, several of which are illustrated inFIGS. 8A-9C . First, as shown in each ofFIGS. 8A-8C ,PBS2 130, which has locally authenticated the online identity, user@PBS1.com, informs a foreign presence-based service (e.g., PBS1 120) of presence by user@PBS1.com. Second, as shown inFIGS. 9A-9C , the foreign presence-based service, e.g.,PBS1 120, is informed of user@PBS1.com presence by virtue of having to authenticate the user@PBS1.com (an example of which was illustrated inFIG. 3B ). -
FIG. 8A illustrates aprocess 800A in whichPBS2 130 accesses a local list of foreign interoperable presence-based services to publish the change in presence associated with the online identity to all or a subset of all the foreign interoperable presence-based services appearing on the list.Process 800A begins with theclient system 110 initiating communication withPBS2 130. To that end, the computer operator may use a user interface, such as, for example, the user interface 400 ofFIG. 4A to enter the online identity and credentials. In particular, for instance, the computer operator may enter user@PBS1.com within the screen name field of the user interface 400, enter the credentials associated with user@PBS1.com within the password field, and then select the “sign on” button within the user interface 400. The selection of the “sign on” button results in theclient system 110 sending a request to PBS2 130 for access toPBS2 130, with the request including the online identity and the credentials. -
PBS2 130 receives the request and authenticates user@PBS1.com, without notifying or relying upon PBS1 120 (802 a). For instance,PBS2 130 may authenticate user@PBS1.com using credentials stored in thecredentials database 132 b as a result ofprocess PBS2 130 accesses a profile that includes a local list of foreign interoperable presence-based services (803 a). The local list enablesPBS2 130 to consult its own publication rules in publishing presence information to other services (804 a). For example,PBS2 130 may publish the presence information to all of the foreign presence-based services on the list. Alternatively,PBS2 130 may publish the presence information to the presence-based services that are associated with the domain of the online identity, e.g.,PBS1 120 in the example involving user@PBS1.com. Alternatively,PBS2 130 may publish the presence information to a subset or more of the services on the list. For instance,PBS2 130 may not provide access to presence information for its subscribers by subscribers of obscure services that do not have interoperability withPBS2 130 service or other services on the list. - In another implementation,
PBS2 130 may provide its local list of interoperable services to a single or limited set of foreign presence-based service(s) (or proxy therefor) and request or rely upon the foreign presence-based service(s) (or proxy thereof) to publish the change in presence to other services. In yet another implementation, instead of or in addition toPBS2 130 accessing a list to identify other foreign interoperable presence-based services (e.g., PBS1 120) that may be interested in presence information associated with user@PBS1.com,PBS2 130 receives a request from other foreign interoperable presence based services, notifyingPBS2 130 of their interest in presence information associated with user@PBS1.com. -
FIGS. 8B and 8C illustrateprocesses PBS1 120. Referring toFIG. 8B ,process 800B includes actions (801 b and 802 b) that are the same as actions (801 a and 802 a) ofFIG. 8A and, as such, are previously described above with respect to actions (801 a and 802 a). After authenticating user@PBS1.com,PBS2 130 recognizes that user@PBS1.com is associated with a foreign presence-based service, e.g.,PBS1 120, because of user@PBS1.com's domain (803 b). Thus,PBS2 130 provides an indication of the authentication for user@PBS1.com to the foreign presence-based service that is associated with the user@PBS1.com's domain (804 b).PBS2 130 optionally projects change in presence associated with user@PBS1.com to PBS2 subscribers (805 b). - Upon being notified, the foreign presence-based service (e.g., PBS1 120) accesses list of interoperable presence-based services (806 b) and the foreign presence-based service consults its publication rules and publishes the information in a manner consistent with its publication rules to none, some, or all of the services on a list located at or accessed by the foreign presence-based service (807 b).
- Alternatively, referring to
FIG. 8C ,PBS2 130 may request the list from the foreign presence-based service, and may itself publish to none, some, or all of the services on the list after consulting PSB2 130 (or foreign-provided) publication rules as shown inFIG. 8C .FIG. 8C illustrates aprocess 800C used byPBS2 130 to request a list of interoperable presence-based services (and optionally, publication rules) from the foreign interoperable presence-based service and to publishes to none, some, or all of the services on the list. Actions (801 c-803 c) of theprocess 800C are similar to the actions (801 b-803 b) of theprocess 800B, and, as such, are previously described with respect to actions (801 b-803 b). -
Process 800C differs fromprocess 800B in that inprocess 800C,PBS2 130 does not rely onPBS1 120 for publication. Instead,PBS2 130 requests the list of interoperable presence-based services (and, optionally, publication rules) from the foreign interoperable presence-based service (804 c).PBS2 130 receives the list of interoperable presence-based services (805 c), andPBS2 130 consults its publication rules (and/or rules provided) to provide presence information of user@PBS1.com to none, some or all services on the list (806 c). -
FIGS. 9A-9C illustrateprocesses 900A-900C, respectively, in which the foreign interoperable presence-based service (e.g., PBS1 120) is informed of change in presence of an online identity, user@PBS1.com, by virtue of having to authenticate user@PBS1.com. Specifically,FIG. 9A illustratesprocess 900A in whichPBS2 130 solicits PBS1120 to authenticate a computer operator using an online identity and to publish the presence information associated with the online identity.Process 900A begins withclient system 110 initiating communication withPBS2 130 using the online identity, user@PBS1.com (901 a). In response,PBS2 130 communicates withPBS1 120, the presence-based system associated with the user@PBS1.com,s domain, to authenticate user@PBS1.com (902 a). In one example,PBS2 130 may submit to PBS1 120 the online identity and the credentials associated therewith and may requestPBS1 120 to carryout the authentication step, as shown byprocess 300B ofFIG. 3B .PBS1 120 then authenticates user@PBS1.com (903 a). In another implementation,PBS2 130 may request the credentials information fromPBS1 120 andPBS2 130 uses the credentials information to authenticate the online identity, as shown byprocess 300C ofFIG. 3C .PBS2 130 then regulates access to the client system based on the authentication.PBS2 130 also may project changes in presence experienced by the online identity to its subscribers. - After authentication,
PBS1 120 accesses a list of interoperable presence-based services that is stored at PBS1 120 (904 a).PBS1 120 consults its publication rules and publishes the presence information associated with the online identity to none, some, or all of the presence-based services on the list accordingly (905 a). In one implementation,PBS1 120 does not publish the change in presence to PBS2 130 becausePBS2 130 has already projected this information to its subscribers. - Referring to
FIGS. 9B-9C , the list of interoperable services is not stored at PBS1 120 (or at least not relied upon from PBS1 120), andPBS1 120 either requests the list fromPBS2 130 or providesPBS2 130 with authentication information so thatPBS2 130 can publish the change in presence to one or more interoperable services. Specifically,FIG. 9B illustratesprocess 900B in whichPBS1 120 requests the list fromPBS2 130 andPBS1 120 publishes to none, some, or all of the interoperable presence-based services that are on the list in a manner consistent withPBS1 120 publication rules.Process 900B includes actions (901 b-903 b), which are the same as actions (901 a-903 a) and, as such, are previously described with respect to actions (901 a-903 a).Process 900B differs fromprocess 900A in that inprocess 900B,PBS1 120 requests a list of interoperable presence-based services from PBS2 130 (904 b).PBS2 130 provides the list to PBS1 120 (905 b), andPBS1 120 publishes the presence information associated with the online identity to none, some, or all the services on the list consistent withPBS1 120 publication rules (906 b). Alternatively,PBS1 120 may accessPBS2 130 publication rules and publish the change in presence to none, some, or all of the interoperable presence-based services that are on the list in a manner consistent withPBS2 130 publication rules. - Referring to
FIG. 9C ,PBS1 120 provides a notification of authentication to PBS2 130, andPBS2 130 publishes to the interoperable presence-based services that are on the list consistent with PBS2 130 (or foreign-provided) publication rules.Process 900C includes actions (901 c-903 c), which are the same as actions (901 a-903 a) and, as such, are previously described with respect to actions (901 a-903 a).Process 900C is different fromprocesses process 900C,PBS1 120 provides an indication of authentication to PBS2 130 (904 c) andPBS2 130 accesses the list of interoperable presence-based services (905 c) and publishes the presence information to none, some, or all the services on the list consistent withPBS2 130 publication rules (906 c). - During the publication processes illustrated by
FIGS. 8A-8C and 9A-9C, the information that is published can include the online identity (e.g., e-mail address), reference ID, and identity of service through which login was achieved (e.g., PBS2), among other information. As shown inFIG. 10 , a table 1000 of such information may be maintained at all interoperable systems, or some subset or proxy therefor (e.g., in the domain services only). This information may be used to assist the services to keep track of the local presence of the online identity for purposes of delivering messages to the online identity as described further below. - Referring to
FIG. 11 , an openname space network 1100 is similar to that ofFIG. 1 but includes a clientmobile device 140. The clientmobile device 140 includesclient software 142 configured for presence-based service associated withPBS1 120 orPBS2 130. The presence-basedsystems FIG. 12 , when a computer operator submits user@PBS1.com in attempting to register its online presence with presence-basedservice 134 offered byPBS2 130,PBS2 130 authenticates and provides access to the computer operator as described previously. Thereafter, if a clientmobile device 140 is used by the operator to submit user@PBS1.com while attempting to accessPBS1 120.PBS1 120 authenticates and provides access to the operator of the client mobile device. - In particular,
FIG. 12 illustrates aprocess 1200 in which theclient system 110 submits a request to accessPBS2 130 using an online identity, user@PBS1.com (1210). In response,PBS2 130 requests authentication credentials from the client system 110 (1211). The operator of theclient system 110 provides the credentials, which are submitted to PBS2 130 (1212). - Upon receiving the credentials,
PBS2 130 submits the credentials (and online identity) to PBS1 120 (1213).PBS1 120 authenticates user@PBS1.com and notifiesPBS2 130 that it has authenticated user@PBS1.com (1214). In response,PBS2 130 enables theclient system 110 to accessPBS2 130 using user@PBS1.com (1215). - Later, but concurrently, the client
mobile device 140 requests access toPBS1 120 using the same online identity (e.g., user@PBS1.com) (1216). In response,PBS1 120 requests credentials from the client mobile device 140 (1217), and the operator of the clientmobile device 140 provides the credentials, which are submitted toPBS1 120. Thelogin server 122 authenticates the online identity and enables the clientmobile device 140 to accessPBS1 120 using the online identity (1219). - A
process 1300A shown byFIG. 13A , while similar in some respects to theprocess 1200 ofFIG. 12 , provides a more detailed example of authenticating and authorizing theclient system 110 to accessPBS2 130 using the online identity, user@PBS1.com.Process 1300A includes actions (1310 a-1325 a) which are the same as actions (310 c-325 c) described with respect to process 300C ofFIG. 3C . As such, the actions (1310 a-1325 a) ofprocess 1300A are not described here in further detail. Referring toFIG. 13B ,process 1300A continues withPBS2 130 publishing presence information to one or more interoperable presence-based services (e.g., PBS1 120) (1327 a). As a result,PBS1 120 receives publication of the presence information of the online identity (1328 a). Among other features, this may enablePBS1 120 to inform its subscribers of the presence information.PBS1 120 andPBS2 130 may increment a counter or update a table in order to keep track of the number of times (and specifics therefor) the online identity is used to log into one or more presence-based services or devices and device types (1329 a and 1330 a). - Referring to
FIG. 14 , aprocess 1400 is similar in some respects to theprocess 1200 ofFIG. 12 , but provides a more detailed example of authenticating and authorizing the clientmobile device 140 to accessPBS1 120 using the online identity, user@PBS1.com.Process 1400 begins with the clientmobile device 140 submitting a request to access presence-basedservice 124 offered by PBS1 120 (1410). The request includes the online identity, user@PBS1.com. In one example, the operator of the clientmobile device 140 uses theclient software 142 associated with the presence-basedservice 124 to submits its request.PBS1 120 receives the request (1411) and, in response, requests credentials for user@PBS1.com (1412). The clientmobile device 140 receives the request for credentials and requests the credentials from the operator of the client mobile device 140 (1413). The operator of the clientmobile device 140 provides the credentials, which are submitted to PBS1 120 (1414). -
PBS1 120 receives the credentials (1415) and authenticates user@PBS1.com (1416). Additionally,PBS1 120 may recognizePBS2 130's past publication of presence information for user@PBS1.com by consulting its table or counter (1417). After detecting past publication of presence for the online identity (e.g., by consulting its table or counter),PBS1 120 records the local presence of the user@PBS1.com by incrementing its counter or adding a new row to its table (1418).PBS1 120 optionally projects the change in presence to PBS1 120 subscribers (1419), and/or optionally publishes the change in presence to other services such as the presence-based service of PBS2 130 (1420). IfPBS1 120 choose to publish the change in presence toPBS2 130, thenPBS2 130 receives publication of change in presence associated with user@PBS1.com (1421) and increments its counter or updates its table to record the presence of user@PBS1.com at PBS1 120 (1422). - Referring to
FIG. 15 ,PBS1 120 may publish full attribution or limited attribution of changes in presence, as shown byprocess 1500.Process 1500 begins withPBS1 120 receiving a request from the clientmobile device 140 to accessPBS1 120 using the online identity, user@PBS1.com (1510). In response,PBS1 120 requests for credentials from the clientmobile device 140 and receives credentials from the client mobile device 140 (1512).PBS1 120 authenticates user@PBS1.com (1513) and recognizes past publication of change in presence associated with user@PBS1.com by consulting its table or counter (1514).PBS1 120 records local presence of user@PBS1.com by incrementing its counter or updating its table (1515). Then,PBS1 120 determines whether to project attributes to PBS1 120 subscribers (1516). For example, this may include showing to the subscribers that user@PBS1.com is now available on the clientmobile device 140. Based on this determination,PBS1 120 either projects the presence information to its subscriber (1517) or it does not (1518).PBS1 120 determines whether to publish the presence information to another interoperable presence-based system (e.g., PBS2 130) (1519). Based on a positive determination,PBS1 120 either publishes a full attribution (1522) or a limited attribution (1523). The limited attribution publication of presence information may include publishing the new presence of the online identity without the indication of the client device the operator used to log into the PBS1 presence-basedservice 122. The full attribution publication of the presence information may include publishing the new change in presence of the online identity and the identity of the client device the operator used to access the PBS1 presence-basedservice 122. -
FIGS. 16A and 16B illustrate an example of a table 125 stored in presence-based service ofPBS1 120. Referring toFIG. 16A , a table 125 includes information such as an online identity (e.g., e-mail address), identity of the service through which login was achieved, identity of a client device the operator used to access the service, and duration of online presence by the online identity. Referring toFIG. 16B , a table 125 includes a counter and a list of online identities. For instance, the counter shows that one or more client devices uses an online identity, user@PBS2.com, multiple times to gain access to one or more interoperable presence-based services. -
PBS1 120 andPBS2 130 may be configured to utilize information within these tables for several reasons or in various contexts. First, this information may be used to track the past publication of presence information corresponding to the online identity, and to determine whether a new publication is necessary when the online identity is used to again log into one or more presence-based interoperable services or devices. Second, this information may be used to track the number of times the online identity is used to log into one or more different interoperable services so that log off from less than all of the services or device types does not cause premature perception of a complete loss of online presence. Third, updating the table with the information such as the online identity and service of login allows the interoperable services to easily determine whether or where to send traffic that is directed from their subscribers to the online identity as described further below. - Referring to
FIG. 16C , the PBS1 presence-basedservice 124 also includesother attributes database 127. Theother attributes database 127 keeps track of other presence information. For example,FIG. 16C reveals that a user@PBS1.com is logged intoPBS1 120 via theclient system 110, and the user@PBS1.com does not have an active presence at theclient system 110, e.g., the user@PBS1.com is idle. Similarly,FIG. 16C reveals that user@PBS1 is also logged intoPBS1 120 via the clientmobile device 140, and the user@PBS1.com is away from the clientmobile device 140. The PBS1 presence-basedservice 124 may project this information to its subscribers. Additionally, the PBS1 presence-basedservice 124 may publish this information to other interoperable presence-based services. - At the conclusion of processes illustrated in
FIGS. 13A and 13B , 14, and 15,PBS1 120 has several options for delivering traffic to the online identity, as shown byprocesses 1700A-1700C ofFIGS. 17A-17C . More specifically, for purposes of description, it is assumed that the presence-basedservice 124 offered by PBS1120 recognizes the online identity as having presence directly throughPBS1 120 and indirectly throughPBS2 130, e.g., via a communication fromPBS2 130 toPBS1 120 that results from interoperability between the systems in response to the user having signed into PBS2 130 (shown inFIG. 13A-13B ). Because a direct and an indirect presence are both recognized, when traffic fromPBS1 120 subscribers is directed to an online identity whose domain isPBS1 120, such as user@PBS1.com,PBS1 120 has options of (1) sending the traffic directly, meaning through the PBS1 presence-basedservice 124, to the online identity such that the traffic is received by the online identity at client devices through which the user logged directly into PBS2 130 (e.g., the client mobile device inFIG. 12 ), as shown inFIG. 17A ; (2) sending the traffic indirectly, meaning throughPBS2 130, to the online identity such that the traffic is received by the online identity at client devices through which the user logged indirectly into PBS1 120 (e.g., theclient system 110 inFIG. 12 ), as shown inFIG. 17B , or (3) sending the traffic to presence-based services of bothPBS1 120 andPBS2 130, such that the online identity receives it at client devices that leverage PBS1120 and those that leverage other domains and associated software (e.g., the clientmobile device 140 and theclient system 110 inFIG. 12 ), as shown inFIG. 17C . - Below,
FIGS. 17A-17C are each described in more detail.FIG. 17A illustrates aprocess 1700A that is used byPBS1 120 to send the traffic fromPBS1 120 subscribers directly to the online identity such that the traffic is received by the online identity at a client device (e.g., the client mobile device 140) through which the user logged directly intoPBS1 120. Process 17A begins withPBS1 120 receiving, from at least one of its subscribers, traffic directed to the online identity, user@PBS1.com (1710 a). By consulting a table or a counter,PBS1 120 recognizes online presence of user@PBS1.com atPBS1 120 and one or more other interoperable presence-based systems (e.g., PBS2 130) (1711 a). The table may include the either of the example tables 125 shown inFIGS. 16A and 16B , or some combination thereof. -
PBS1 120 consultsPBS1 120 traffic delivery rules to determine where to direct the traffic (1712 a). In one implementation and as shown inFIG. 17A , the traffic delivery rules may indicate delivery of traffic only through PBS1 120 (1713 a). In accordance with the traffic delivery rule,PBS1 120 consults its table to determine which client device is being used to access PBS1 120 (1714 a).PBS1 120 recognizes the online presence of the online identity at the clientmobile device 140 throughPBS1 120 directly (1715 a) and, according to the traffic delivery rules, sends the traffic to the online identity at the client mobile device 140 (1716 a). The clientmobile device 140 receives the traffic (1717 a). As such, in this implementation, only the clientmobile device 140 receives the traffic. -
FIG. 17B illustrates an example of aprocess 1700B that is used byPBS1 120 to send the traffic fromPBS1 120 indirectly to the online identity such that the traffic is received by the online identity at a client device (e.g., theclient system 110 ofFIG. 12 ) accessingPBS2 130.Process 1700B includes actions (1710 b-1713 b), which are the same as actions (1710 a-1712 a) illustrated inprocess 1700A ofFIG. 17A and, as such, are previously described with respect to actions (1710 a-1712 a).Process 1700B is different fromprocess 1700A because inprocess 1700B the traffic delivery rules instructPBS1 120 to direct the traffic only through PBS2 130 (1713 b), whereas inprocess 1700A the traffic delivery rules instructPBS1 120 to direct the traffic only throughPBS1 120. -
PBS1 120 therefore consults its table to determine which client device is being used to access PBS2 130 (1714 b).PBS1 120 recognizes the online presence of the online identity at theclient system 110 through PBS2 130 (1715 b), and sends the traffic to PBS2 130 (1716 b).PBS2 130 receives the traffic (1717 b) and forwards the traffic to the online identity at the client system 110 (1718 b). As such, in this implementation, only theclient system 110 receives the traffic (1719 b). -
FIG. 17C illustrates an example of aprocess 1700C that is used byPBS1 120 to send the traffic to client devices accessing bothPBS1 120 andPBS2 130 using the online identity, such that the traffic is received at a client device (e.g., the client mobile device 140) that leveragePBS1 120 and a client device (e.g., the client system 110) that leveragePBS2 130. The actions (1710 c-1712 c) ofprocess 1700C is the same as actions (1710 a-1712 a) and, as such, are not described here in more detail. Inprocess 1700C, the traffic delivery rules instructPBS1 120 to direct traffic through all interoperable presence-based services (e.g.,PBS1 120 and PBS2 130). -
PBS1 120 consults its table to determine which client devices are accessingPBS1 120 and PBS2 130 (1714 c). PBS1120 recognizes online presence of the online identity at the clientmobile device 140 viaPBS1 120 and at theclient system 110 via PBS2 130 (1715 c). As such,PBS1 120 sends the traffic to the online identity at the client mobile device (1716 c) and submits the traffic to PBS2 120 for delivery to the client system 110 (1717 c).PBS2 130 receives the traffic (1718 c) and forwards the traffic to the online identity at the client system 110 (1719 c). Therefore, in this implementation, the traffic is delivered to both theclient system 110 and the client mobile device 140 (1720 c and 1721 c). - In a slightly modified scenario where a traffic originates from a
PBS2 130 subscriber, it may be routed directly to user@PBS1.com viaPBS2 130. Additionally,PBS2 130 may informPBS1 120 of such communication. In particular,PBS2 130 may informPBS1 120 that a traffic was communicated to its online identity. The information may include the online identity, identity of the sender and the time and date the traffic was sent to user@PBS1.com. In this manner,PBS1 120 is enabled to keep track of the traffic that is being sent to user@PBS1.com regardless of whether the traffic delivery rules specify that the traffic should go throughPBS1 120 and/orPBS2 130 to reach user@PBS1.com. - Referring to
FIG. 18 , aprocess 1800 is shown in which theclient system 110 and the clientmobile device 140 uses an online identity, user@PBS1.com, to access a presence-basedservice 134 ofPBS2 130.Process 1800 begins with theclient system 110 requesting access toPBS2 130 using user@PBS1.com (1810). As suggested with respect toFIG. 3B , alogin server 132 ofPBS2 130 authenticates the online identity at client system 110 (1811-1815), and a presence-basedservice 134 ofPBS2 130 projects presence information of the online identity at theclient system 110 toPBS2 130 subscribers. As suggested with respect toFIGS. 8A and 8C , the presence-basedservice 134 ofPBS2 130 also publishes the changes in presence of the online identity at theclient system 110 toPBS1 120 consistent withPBS2 130 publication rules (1816).PBS1 120 may project the changes in presence to its subscribers. - Later, but concurrently, the client
mobile device 140 requests access toPBS2 130 using the same online identity, user@PBS1.com (1817). As suggested with respect toFIG. 3D , thelogin server 132 ofPBS2 130 authenticates the online identity (1818-1820), and the presence-basedservice 134 ofPBS2 130 projects changes in presence of the online identity at the clientmobile device 140 toPBS2 130 subscribers. As suggested with respect toFIGS. 8A and 8C , the presence-basedservice 134 ofPBS2 130 also publishes the changes in presence of the online identity at the clientmobile device 140 toPBS1 120 consistent withPBS2 130 publication rules (1821). Upon being informed of the changes in presence, aPBS1 120 subscriber may send a message to user@PBS1.com. The message may be configured for limited traffic delivery according to the traffic delivery rules hosted byPBS1 120. There are many methods that may be used to communicate the traffic delivery rules hosted by one presence-based system, e.g.,PBS1 120, to one or more other presence-based systems, e.g.,PBS2 130, thereby allowing those rules to be applied by the other systems or domains in effecting the desired traffic routing. -
FIGS. 19A-19C show a few methods for communicating the traffic delivery rules hosted byPBS1 120 toPBS2 130. Referring toFIG. 19A ,process 1900A may be used byPBS1 120 to communicate all the traffic delivery rules toPBS2 130.Process 1900A begins withPBS1 120 receiving a message directed to the online identity from one ormore PBS1 120 subscribers (1910 a).PBS1 120 consults its table to determine local presence of the online identity (1911 a) and recognizes presence of the online identity at theclient system 110 and the clientmobile device 140 through PBS2 130 (1912 a).PBS1 120 accesses traffic delivery rules for delivering the message (1913 a) and submits the rules to PBS2 130 (1914 a). Thereafter,PBS1 120 submits the message to PBS2 130 (1916 a).PBS2 130 receives the rule(s) and the message from PBS1 120 (1915 a and 1917 a), and delivers the message to the online identity at theclient devices - Referring to
FIG. 19B , in another implementation,PBS1 120 may communicate a subset of the rules based on the message or type of services into which the online identity is logged in, as shown byprocess 1900B. The actions (1910 b-1913 b) ofprocess 1900B are the same as actions (1910 a-1913 a) ofprocess 1900A, and, as such, they are not described here in more detail.Process 1900B also includesPBS1 120 submitting a subset of rules based on the message and/or the device type used to access the presence based service (1914 b) and separately submitting the message to PBS2 130 (1916 b).PBS2 130 receives the subset of the rules and the message (1915 b and 1917 b) and delivers the message to the online identity at theclient devices - Referring to
FIG. 19C , in a different implementation,PBS1 120 may attach the rules to the message (1914 c) and send the rules with the message to PBS2 130 (1915 c).PBS2 130 receives the message (1916 c), extracts the rules from the message (1917 c), and sends the message to the online identity consistent with the rules (1918 c). The actions (1910 c-1913 c) ofprocess 1900C are the same as actions (1910 a-1913 a) ofprocess 1900A and, as such, they are not described here in more detail. In yet another implementation,PBS1 120 may deliver the rules at the time it returns an indication of authentication to PBS2 130 for the online identity, as shown inFIG. 12 . - In one specific example, rules hosted by
PBS1 120 may include delivery of the traffic to user@PBS1.com according to the particular client device used to access the presence-basedservice 134 of PBS2 130 (e.g., sending the traffic to the online identity at the client system 110). The traffic delivery rules are first communicated to PBS2 130 according to one of the several methods described with respects toFIGS. 19A-19C .PBS2 130 consults the traffic delivery rules and consistent with the rules sends the message to user@PBS1.com at theclient system 110. Thus, user@PBS1.com at the clientmobile device 140 does not receive the message. Alternatively, the rules may require the delivery of the message to user@PBS1.com logged in to the PBS2 presence-basedservice 134 via the clientmobile device 140. Thus, user@PBS1.com logged in via theclient system 110 does not receive the message. - In another implementation, an online identity (e.g., user@PBS1.com) accesses a first presence-based service (e.g., PBS2 130) that is not associated with the domain of the online identity. The online identity may have a connection to a second presence-based service (e.g., PBS3) through the first presence-based service. Thereafter, user@PBS1.com receives, at the first presence-based service, a message from a PBS3 subscriber. The message may originate from PBS3 and may be delivered to
PBS2 130. Upon receiving a message,PBS2 130 may need to access traffic delivery rules associated with the online identity in order to regulate delivery of the message to the online identity based on the traffic delivery rules. To do so, in one example,PBS2 130 requests the traffic delivery rules from a third presence-based service. The third presence-based service (e.g., PBS1 120) may be associated with the domain of the online identity. Alternatively, the third presence-based service may be a centralized service that includes traffic delivery rules for online identities (e.g., at all interoperable presence-based services). In another slightly modified scenario, instead of requesting the traffic delivery rules from the third presence-based service,PBS2 130 merely reports to the third presence-based service that the online identity has accessedPBS2 130 and in response, the third presence-based service publishes the traffic delivery rules toPBS2 130. In this implementation, as the traffic delivery rules changesPBS1 120 may publish the changes toPBS2 130. In either case, after receiving the traffic delivery rules from the third presence-based service,PBS2 130 regulates delivery of the traffic based on the traffic delivery rules. -
FIG. 20 illustrates a trafficdelivery rules database 2000 hosted by a presence-based system, e.g.,PBS1 120. The traffic delivery rules may be customized for an individual. In one implementation, the traffic delivery rules may be customized for the operator of the client system using the online identity and, as such, the traffic delivery rules govern receipt of the message based on preferences of the online identity or the first presence-based service. Alternatively, the traffic delivery rules may be customized for a sender of the message and, as such, the traffic delivery rules regulate delivery of the message to the online identity based on preferences of the sender of the message or a presence-based service associated with the sender of the message. - The traffic
delivery rules database 2000 may include rules for delivery of the traffic through one or more presence-based systems, as noted with respect toFIGS. 17A-17C . In addition, the trafficdelivery rules database 2000 may include rules for delivery of traffic to a selected subset of online identities for one or more interoperating presence-based systems. For instance, the trafficdelivery rules database 2000 may include rules for delivery of the traffic based on the client device the operator of the online identity uses to log into the PBS2 presence-basedservice 134, as noted above. Alternatively or additionally, the trafficdelivery rules database 2000 may include rules for delivery of the traffic to one or more client devices at a particular time of day such that the traffic is received at the devices that the operator uses at a particular time of day. For example, as shown inFIG. 20 , the traffic is sent to the online identity at the client mobile device between 7 am-9 am because the operator using the online identity is likely to be on his or her way to work during that time. Additionally, the trafficdelivery rules database 2000 includes rules for delivery of the traffic to the client devices at which the online identity has an active presence according to presence information stored in the PBS1 presence basedservice 124 as shown inFIG. 16C . For example, the message may be delivered to the online identity at the client devices in which the online identity is not idle, away, or hidden. - Alternatively, the traffic delivery rules may include instructions for determining whether the online identity has a direct presence at a first presence-based service from which the message originates (in keeping with the
above example PBS1 120 with respect toFIGS. 19A-19C ), and in the absence of such direct presence, the traffic delivery rules include instructions for delivering the message to the online identity through a second presence-based service (e.g., PBS2 130). If such direct presence is determined to exists, the traffic delivery rules include instructions for delivering the message to the online identity through the first instant messaging service (e.g., PBS1 120). To have direct presence at the first presence-based service, in one example, the operator of theclient system 110 has to directly login into the first presence-based service. - The traffic
delivery rules database 2000 may also include rules regarding the priority of the message. For instance, if the message is urgent the traffic delivery rules may instruct the PBS2 presence-basedservice 134 to send the traffic to the online identity at all client devices. - In one specific example, EarthLink® and AOL® internet service providers represent
PBS1 120 andPBS2 130, respectively, and EarthLink® IM and AOL® IM represent the presence-based services forPBS1 120 andPBS2 130, respectively. A client system operator using user@EarthLink.com logs into EarthLink® IM service through EarthLink® IM client at the client system. Later, but concurrently, the operator using user@EarthLink.com logs into AOL® IM service through an AOL® IM client at a client mobile device. For purpose of this example, we assume that AOL® recognizes the online identity as having presence directly through AOL® IM service and indirectly through EarthLink® IM service, e.g., via communications from EarthLink® to AOL® that results from interoperability between the services in response to user@Earthlink.com having logged into the EarthLink® IM service (shown inFIG. 13A-13B ). Because a direct and an indirect presence are both recognized, when traffic from AOL® subscribers is directed to the user@EarthLink.com, AOL®, consistent with its traffic delivery rules, may have options of (1) sending the traffic through AOL®, such that the traffic is received by user@EarthLink.com at client devices through which user@EarthLink.com logged directly into AOL® IM service (e.g., the client mobile device in the scenario described above), (2) sending the traffic through EarthLink,® such that the traffic is received by user@EarthLink.com at client devices through which the user@EarthLink.com logged directly into EarthLink® IM service (e.g., the client system in the scenario described above), and (3) sending the traffic to each of the AOL® and EarthLink®, such that it is received at clients for both services through which the user logged in. - A number of implementations have been described. Nevertheless, it will be understood that various modifications may be made. For example, while the foregoing techniques have been described with changes in presence, including online presence at a particular presence-based service and changes thereto, e.g., log in, log off, idle, away, and hide, the references made to changes in presence, additionally or alternatively, may be used to reference changes in presence at different device types, services, and/or processes. Thus, presence has been used to describe online presence generally, as well as the presence at one or more particular services, service provides, devices, or device types. Similarly, changes in presence has been used to describe changes in online presence generally, as well as the presence at one or more particular services, service providers, devices, or device types. Furthermore, while foregoing techniques have been described with an operator of client devices using an identity with the form username@domain, other forms may be used to access one or more interoperable presence-based services.
Claims (42)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/561,886 US20070162600A1 (en) | 2005-11-18 | 2006-11-20 | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US73775505P | 2005-11-18 | 2005-11-18 | |
US11/561,886 US20070162600A1 (en) | 2005-11-18 | 2006-11-20 | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070162600A1 true US20070162600A1 (en) | 2007-07-12 |
Family
ID=38067820
Family Applications (9)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/561,886 Abandoned US20070162600A1 (en) | 2005-11-18 | 2006-11-20 | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US11/561,877 Active 2030-01-06 US8996620B2 (en) | 2005-11-18 | 2006-11-20 | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US11/561,880 Expired - Fee Related US9392069B2 (en) | 2005-11-18 | 2006-11-20 | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US11/561,882 Active 2029-01-10 US8396922B2 (en) | 2005-11-18 | 2006-11-20 | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US13/786,350 Abandoned US20130185358A1 (en) | 2005-11-18 | 2013-03-05 | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US15/191,752 Active US9825889B2 (en) | 2005-11-18 | 2016-06-24 | Presence-based systems and methods using electronic messaging activity data |
US15/817,669 Expired - Fee Related US10645038B2 (en) | 2005-11-18 | 2017-11-20 | Presence-based systems and methods using electronic messaging activity data |
US16/836,165 Active US10904172B2 (en) | 2005-11-18 | 2020-03-31 | Presence-based systems and methods using electronic messaging activity data |
US17/137,005 Active US11902226B2 (en) | 2005-11-18 | 2020-12-29 | Presence-based systems and methods using electronic messaging activity data |
Family Applications After (8)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/561,877 Active 2030-01-06 US8996620B2 (en) | 2005-11-18 | 2006-11-20 | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US11/561,880 Expired - Fee Related US9392069B2 (en) | 2005-11-18 | 2006-11-20 | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US11/561,882 Active 2029-01-10 US8396922B2 (en) | 2005-11-18 | 2006-11-20 | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US13/786,350 Abandoned US20130185358A1 (en) | 2005-11-18 | 2013-03-05 | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US15/191,752 Active US9825889B2 (en) | 2005-11-18 | 2016-06-24 | Presence-based systems and methods using electronic messaging activity data |
US15/817,669 Expired - Fee Related US10645038B2 (en) | 2005-11-18 | 2017-11-20 | Presence-based systems and methods using electronic messaging activity data |
US16/836,165 Active US10904172B2 (en) | 2005-11-18 | 2020-03-31 | Presence-based systems and methods using electronic messaging activity data |
US17/137,005 Active US11902226B2 (en) | 2005-11-18 | 2020-12-29 | Presence-based systems and methods using electronic messaging activity data |
Country Status (2)
Country | Link |
---|---|
US (9) | US20070162600A1 (en) |
WO (1) | WO2007061946A2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070162555A1 (en) * | 2005-11-18 | 2007-07-12 | Aol Llc | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US20120136943A1 (en) * | 2010-11-25 | 2012-05-31 | Infosys Technologies Limited | Method and system for seamless interaction and content sharing across multiple networks |
US8677451B1 (en) | 2010-06-22 | 2014-03-18 | Cellco Partnership | Enabling seamless access to a domain of an enterprise |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080126475A1 (en) * | 2006-11-29 | 2008-05-29 | Morris Robert P | Method And System For Providing Supplemental Information In A Presence Client-Based Service Message |
WO2008115100A1 (en) * | 2007-03-19 | 2008-09-25 | Telefonaktiebolaget Lm Ericsson (Publ) | A method and apparatus for notifying clients in a communication network. |
US8479272B2 (en) * | 2007-06-04 | 2013-07-02 | Avaya Inc. | Identity assertion |
EP2250793B1 (en) * | 2008-02-14 | 2022-07-20 | Nokia Technologies Oy | System and method for implementing a publication |
ES2373357T3 (en) * | 2008-02-29 | 2012-02-02 | Telefonaktiebolaget L M Ericsson (Publ) | TECHNIQUE FOR CONDUCTING THE SIGNALING CONVERSION BETWEEN THE HTTP AND SIP DOMAINS. |
US8799983B2 (en) | 2008-05-22 | 2014-08-05 | Avaya Inc. | Insight distribution |
EP2222057A1 (en) | 2009-02-24 | 2010-08-25 | Research In Motion Limited | Subscription management for a content-based presence service |
EP2222106A1 (en) * | 2009-02-24 | 2010-08-25 | Research In Motion Limited | Method and system for registering a presence user with a presence service |
EP2222055A1 (en) | 2009-02-24 | 2010-08-25 | Research In Motion Limited | Content-based publication-subscription system for presence information |
US10122550B2 (en) * | 2010-02-15 | 2018-11-06 | International Business Machines Corporation | Inband data gathering with dynamic intermediary route selections |
FR2978573B1 (en) | 2011-07-27 | 2013-08-16 | Poste | METHOD OF MATCHING DATA AND USE IN IDENTITY VERIFICATION OF A RECIPIENT OF A MAIL |
US9674048B2 (en) * | 2013-06-03 | 2017-06-06 | Qualcomm Incorporated | Efficient infrastructure service discovery with security |
US20150106741A1 (en) * | 2013-10-15 | 2015-04-16 | Microsoft Corporation | Managing conversations |
US20160142324A1 (en) * | 2014-11-18 | 2016-05-19 | Alcatel-Lucent Canada Inc. | Diameter Message Throttling |
US11003627B2 (en) | 2016-04-21 | 2021-05-11 | Microsoft Technology Licensing, Llc | Prioritizing thumbnail previews based on message content |
US10333766B2 (en) * | 2016-06-13 | 2019-06-25 | Dark Matter L.L.C | Routing secure communications across multiple communication devices or points-of-presence |
US11729298B2 (en) * | 2017-08-31 | 2023-08-15 | Global Tel*Link Corporation | Video kiosk inmate assistance system |
US11411735B2 (en) | 2018-06-15 | 2022-08-09 | Proxy, Inc. | Methods and apparatus for authorizing and providing of distributed goods or services |
US11438767B2 (en) | 2018-06-15 | 2022-09-06 | Proxy, Inc. | Methods and apparatus for preauthorizing reader devices |
US11546728B2 (en) | 2018-06-15 | 2023-01-03 | Proxy, Inc. | Methods and apparatus for presence sensing reporting |
US11462095B2 (en) | 2018-06-15 | 2022-10-04 | Proxy, Inc. | Facility control methods and apparatus |
US11109234B2 (en) | 2018-06-15 | 2021-08-31 | Proxy, Inc. | Reader device with sensor streaming data and methods |
US11509475B2 (en) | 2018-06-15 | 2022-11-22 | Proxy, Inc. | Method and apparatus for obtaining multiple user credentials |
US11190468B2 (en) | 2019-04-19 | 2021-11-30 | Microsoft Technology Licensing, Llc | Method and system of synchronizing communications in a communication environment |
US11683282B2 (en) * | 2019-08-15 | 2023-06-20 | Microsoft Technology Licensing, Llc | Method and system of synchronizing communications |
CN115883500A (en) * | 2019-08-21 | 2023-03-31 | 可可株式会社 | Method and server for providing activity information related to social network service to chat room |
Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6175854B1 (en) * | 1996-06-11 | 2001-01-16 | Ameritech Services, Inc. | Computer system architecture and method for multi-user, real-time applications |
US6505238B1 (en) * | 1999-08-19 | 2003-01-07 | International Business Machines Corporation | Method and system for implementing universal login via web browser |
US20030018726A1 (en) * | 2001-04-27 | 2003-01-23 | Low Sydney Gordon | Instant messaging |
US20030131061A1 (en) * | 2001-11-28 | 2003-07-10 | Active Buddy, Inc. | Transparent proxy server for instant messaging system and methods |
US20030212791A1 (en) * | 2002-04-23 | 2003-11-13 | Pickup Robert Barkley | Method and system for authorising electronic mail |
US20030220976A1 (en) * | 2002-05-21 | 2003-11-27 | Bellsouth Intellectual Property Corporation | Temporary contact alias system |
US20040078447A1 (en) * | 2002-09-17 | 2004-04-22 | Malik Dale W. | User profiles for managing email and instant messaging (IM) |
US20040083297A1 (en) * | 2002-10-25 | 2004-04-29 | Yahoo!, Inc. | Centrally controllable instant messaging system |
US20040088546A1 (en) * | 2002-11-06 | 2004-05-06 | Imlogic, Inc | System and method for add-on services, secondary authentication, authorization and/or secure communication for dialog based protocols and systems |
US6807423B1 (en) * | 1999-12-14 | 2004-10-19 | Nortel Networks Limited | Communication and presence spanning multiple access networks |
US20050009517A1 (en) * | 2003-06-27 | 2005-01-13 | Oracle International Corporation, A California Corporation | Roaming across different access mechanisms and network technologies |
US20050021651A1 (en) * | 2003-07-24 | 2005-01-27 | International Business Machines Corporation | Method and system for identification and presentation of statistical usage data for messaging systems |
US20050044144A1 (en) * | 2002-04-29 | 2005-02-24 | Dale Malik | Instant messaging architecture and system for interoperability and presence management |
US20050144246A1 (en) * | 2002-06-07 | 2005-06-30 | Malik Dale W. | Methods, systems, and computer program products for delivering time-sensitive content |
US20050172033A1 (en) * | 2003-07-11 | 2005-08-04 | Boban Mathew | Apparatus and method for multi-layer rule application within an integrated messaging platform |
US20050210112A1 (en) * | 2004-03-18 | 2005-09-22 | Clement Jason L | System and method for integrating multiple messaging systems |
US20050216550A1 (en) * | 2004-03-26 | 2005-09-29 | Paseman William G | Communication mode and group integration for social networks |
US20050227711A1 (en) * | 2004-03-31 | 2005-10-13 | France Telecom | Method and apparatus for creating, directing, storing and automatically delivering a message to an intended recipient upon arrival of a specified mobile object at a designated location |
US20060083192A1 (en) * | 2004-10-01 | 2006-04-20 | Gabriela Dinescu | Communication traffic control methods and systems |
US20080168566A1 (en) * | 2002-05-21 | 2008-07-10 | At&T Delaware Intellectual Property, Inc., Formerly Known As Bellsouth Intl. Prop. Corp. | Group access management system |
US7450531B2 (en) * | 2004-10-26 | 2008-11-11 | Cisco Technology, Inc. | System and method for allocating and distributing end user information in a network environment |
US7487248B2 (en) * | 2002-10-08 | 2009-02-03 | Brian Moran | Method and system for transferring a computer session between devices |
US20090132726A1 (en) * | 2002-09-17 | 2009-05-21 | At&T Intellectual Property I, L.P. | Server-Based Message Protocol Translation |
Family Cites Families (145)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5758257A (en) * | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US5745767A (en) * | 1995-03-28 | 1998-04-28 | Microsoft Corporation | Method and system for testing the interoperability of application programs |
US6487180B1 (en) * | 1996-10-15 | 2002-11-26 | Motorola, Inc. | Personal information system using proximity-based short-range wireless links |
US6679425B1 (en) * | 1997-06-18 | 2004-01-20 | Express Technology, Inc. | Systems, apparatus and processes to verify a person's age to determine if the person is authorized |
US6148091A (en) * | 1997-09-05 | 2000-11-14 | The Identiscan Company, Llc | Apparatus for controlling the rental and sale of age-controlled merchandise and for controlling access to age-controlled services |
US6218945B1 (en) * | 1997-09-10 | 2001-04-17 | John E Taylor, Jr. | Augmented monitoring system |
US6141694A (en) * | 1997-09-16 | 2000-10-31 | Webtv Networks, Inc. | Determining and verifying user data |
EP0944003A1 (en) * | 1998-03-18 | 1999-09-22 | SONY EUROPE GmbH | Notification subsystem |
US6196460B1 (en) * | 1998-08-13 | 2001-03-06 | Cardcom, Inc. | Age verification device |
US6430604B1 (en) | 1999-08-03 | 2002-08-06 | International Business Machines Corporation | Technique for enabling messaging systems to use alternative message delivery mechanisms |
US7680819B1 (en) * | 1999-11-12 | 2010-03-16 | Novell, Inc. | Managing digital identity information |
US20020065894A1 (en) * | 1999-12-03 | 2002-05-30 | Dalal Siddhartha R. | Local presence state and user-controlled presence and message forwarding in unified instant messaging |
US7359938B1 (en) | 1999-12-14 | 2008-04-15 | Nortel Networks Limited | System indicating the presence of an individual or group of individuals |
US7603411B1 (en) * | 1999-12-14 | 2009-10-13 | Nortel Networks Limited | Presence management system |
US6714793B1 (en) * | 2000-03-06 | 2004-03-30 | America Online, Inc. | Method and system for instant messaging across cellular networks and a public data network |
US20020021307A1 (en) * | 2000-04-24 | 2002-02-21 | Steve Glenn | Method and apparatus for utilizing online presence information |
US7003555B1 (en) * | 2000-06-23 | 2006-02-21 | Cloudshield Technologies, Inc. | Apparatus and method for domain name resolution |
US7248677B2 (en) * | 2000-08-22 | 2007-07-24 | Symbian Software Ltd. | Method of and apparatus for communicating user related information using a wireless information device |
CA2439373A1 (en) * | 2001-03-14 | 2002-09-19 | Nokia Corporation | Realization of presence management |
US6876728B2 (en) | 2001-07-02 | 2005-04-05 | Nortel Networks Limited | Instant messaging using a wireless interface |
US7269162B1 (en) * | 2001-07-20 | 2007-09-11 | Cisco Technology, Inc. | Integration of presence services with a network enabled telephony device |
US20050240763A9 (en) * | 2001-08-06 | 2005-10-27 | Shivaram Bhat | Web based applications single sign on system and method |
JP2003173430A (en) * | 2001-09-28 | 2003-06-20 | Sharp Corp | Ic card, scramble releasing device, server device, physical characteristic reader, permitter determining method, permitter registering method, frequency managing method, permitter determining program, permittter registering program, and frequency managing program |
US7774711B2 (en) * | 2001-09-28 | 2010-08-10 | Aol Inc. | Automatic categorization of entries in a contact list |
US8650103B2 (en) | 2001-10-17 | 2014-02-11 | Ebay, Inc. | Verification of a person identifier received online |
US8738392B2 (en) * | 2001-10-24 | 2014-05-27 | Inner Reach Corporation | Health information gathering system |
EP1315064A1 (en) * | 2001-11-21 | 2003-05-28 | Sun Microsystems, Inc. | Single authentication for a plurality of services |
US7580850B2 (en) * | 2001-12-14 | 2009-08-25 | Utbk, Inc. | Apparatus and method for online advice customer relationship management |
GB0202370D0 (en) * | 2002-02-01 | 2002-03-20 | Symbian Ltd | Pinging |
GB0202371D0 (en) * | 2002-02-01 | 2002-03-20 | Symbian Ltd | Footprints |
EP2043326A3 (en) * | 2002-02-14 | 2009-04-22 | Avaya Technology Corp. | Presence tracking and name space interconnection techniques |
US7308579B2 (en) * | 2002-03-15 | 2007-12-11 | Noel Abela | Method and system for internationally providing trusted universal identification over a global communications network |
US20030182551A1 (en) * | 2002-03-25 | 2003-09-25 | Frantz Christopher J. | Method for a single sign-on |
EP1495603B1 (en) * | 2002-04-02 | 2010-06-16 | Verizon Business Global LLC | Call completion via instant communications client |
US8856236B2 (en) * | 2002-04-02 | 2014-10-07 | Verizon Patent And Licensing Inc. | Messaging response system |
US7321969B2 (en) * | 2002-04-26 | 2008-01-22 | Entrust Limited | Secure instant messaging system using instant messaging group policy certificates |
US20030204722A1 (en) * | 2002-04-26 | 2003-10-30 | Isadore Schoen | Instant messaging apparatus and method with instant messaging secure policy certificates |
US7263535B2 (en) * | 2002-05-21 | 2007-08-28 | Bellsouth Intellectual Property Corporation | Resource list management system |
US7447756B2 (en) * | 2002-05-21 | 2008-11-04 | At&T Intellectual Property I, L.P. | Temporary aliasing for resource list |
US7640300B2 (en) * | 2002-06-10 | 2009-12-29 | Microsoft Corporation | Presence and notification system for maintaining and communicating information |
US6757722B2 (en) * | 2002-07-16 | 2004-06-29 | Nokia Corporation | System and method for providing partial presence notifications |
US8150922B2 (en) * | 2002-07-17 | 2012-04-03 | Research In Motion Limited | Voice and text group chat display management techniques for wireless mobile terminals |
US7640293B2 (en) * | 2002-07-17 | 2009-12-29 | Research In Motion Limited | Method, system and apparatus for messaging between wireless mobile terminals and networked computers |
US7111044B2 (en) * | 2002-07-17 | 2006-09-19 | Fastmobile, Inc. | Method and system for displaying group chat sessions on wireless mobile terminals |
GB0218711D0 (en) * | 2002-08-12 | 2002-09-18 | Mitel Knowledge Corp | System and method for facilitating communication using presence and communication services |
US7545762B1 (en) * | 2002-08-20 | 2009-06-09 | Sprint Spectrum L.P. | Method and system for network presence notification |
US20040172279A1 (en) | 2002-08-22 | 2004-09-02 | Ncommon Partners Lp | System and method for objectively managing complex familial interactions and responsibilities |
US20040210634A1 (en) * | 2002-08-23 | 2004-10-21 | Miguel Ferrer | Method enabling a plurality of computer users to communicate via a set of interconnected terminals |
JP3985954B2 (en) * | 2002-08-30 | 2007-10-03 | 富士通株式会社 | Client management method and apparatus |
US7725542B2 (en) * | 2003-02-10 | 2010-05-25 | At&T Intellectual Property I, L.P. | Forwarding IM messages to E-mail |
US20040059781A1 (en) * | 2002-09-19 | 2004-03-25 | Nortel Networks Limited | Dynamic presence indicators |
US7657597B2 (en) * | 2002-09-26 | 2010-02-02 | Sun Microsystems, Inc. | Instant messaging using distributed indexes |
US7480915B2 (en) | 2002-10-03 | 2009-01-20 | Nokia Corporation | WV-IMS relay and interoperability methods |
US7539291B2 (en) * | 2002-10-16 | 2009-05-26 | J2 Global Communications | Enhancing messaging services using translation gateways |
US7590696B1 (en) * | 2002-11-18 | 2009-09-15 | Aol Llc | Enhanced buddy list using mobile device identifiers |
US7428580B2 (en) * | 2003-11-26 | 2008-09-23 | Aol Llc | Electronic message forwarding |
US7899862B2 (en) * | 2002-11-18 | 2011-03-01 | Aol Inc. | Dynamic identification of other users to an online user |
US8204939B2 (en) * | 2002-12-18 | 2012-06-19 | Nokia Corporation | Method and apparatus initiating instant messaging with a party during a telephone call where instant messaging address and telephone number are associated in a database |
US7249161B2 (en) | 2002-12-27 | 2007-07-24 | Nokia Corporation | Method and system for facilitating instant messaging transactions between disparate service providers |
US7711810B2 (en) | 2003-01-03 | 2010-05-04 | Nortel Networks Limited | Distributed services based on presence technology |
US7853563B2 (en) * | 2005-08-01 | 2010-12-14 | Seven Networks, Inc. | Universal data aggregation |
US7474741B2 (en) * | 2003-01-20 | 2009-01-06 | Avaya Inc. | Messaging advise in presence-aware networks |
US7533141B2 (en) * | 2003-01-24 | 2009-05-12 | Sun Microsystems, Inc. | System and method for unique naming of resources in networked environments |
US20040158723A1 (en) * | 2003-02-06 | 2004-08-12 | Root David C. | Methods for providing high-integrity enrollments into biometric authentication databases |
US7263545B2 (en) * | 2003-02-14 | 2007-08-28 | Convoq, Inc. | System and method for immediate and delayed real-time communication activities using availability data from and communications through an external instant messaging system |
US8204938B2 (en) * | 2003-02-14 | 2012-06-19 | Devereux Research Ab Llc | System and method for immediate and delayed real-time communication activities using availability data from and communications through an external instant messaging system |
US20040205175A1 (en) * | 2003-03-11 | 2004-10-14 | Kammerer Stephen J. | Communications system for monitoring user interactivity |
EP1458161A1 (en) * | 2003-03-14 | 2004-09-15 | Siemens Aktiengesellschaft | Method and apparatus for interoperability between the presence services according to the Wireless Village standard and the IP Multimedia Subsystem standard |
US7406501B2 (en) | 2003-03-24 | 2008-07-29 | Yahoo! Inc. | System and method for instant messaging using an e-mail protocol |
US20040196315A1 (en) * | 2003-04-01 | 2004-10-07 | International Business Machines Corporation | Method and apparatus for management of a primary buddy list in an instant messaging system |
US6987847B1 (en) * | 2003-04-15 | 2006-01-17 | America Online, Inc. | Communication device monitoring |
US7421732B2 (en) * | 2003-05-05 | 2008-09-02 | Nokia Corporation | System, apparatus, and method for providing generic internet protocol authentication |
US20050015506A1 (en) * | 2003-05-30 | 2005-01-20 | Kristian Padborg | System and method for anonymous information exchange |
AU2004252882A1 (en) * | 2003-06-10 | 2005-01-06 | Mastercard International Incorporated | Systems and methods for conducting secure payment transactions using a formatted data structure |
US7171190B2 (en) * | 2003-06-25 | 2007-01-30 | Oracle International Corporation | Intelligent messaging |
WO2005002126A2 (en) | 2003-06-26 | 2005-01-06 | Deviant Technologies, Inc. | Self-contained instant messaging appliance |
US20050033852A1 (en) | 2003-07-14 | 2005-02-10 | Jouko Tenhunen | System, apparatus, and method for providing presence boosted message service reports |
US7317716B1 (en) * | 2003-07-25 | 2008-01-08 | Verizon Laboratories Inc. | Methods and systems for presence-based telephony communications |
US20050037762A1 (en) * | 2003-08-15 | 2005-02-17 | Lucent Technologies, Inc. | Methods and apparatus for alternative routing of text based messages on a cellular telephone network |
GB0321570D0 (en) * | 2003-09-15 | 2003-10-15 | British Telecomm | Inter-domain congestion charging |
US7788711B1 (en) * | 2003-10-09 | 2010-08-31 | Oracle America, Inc. | Method and system for transferring identity assertion information between trusted partner sites in a network using artifacts |
WO2005048531A1 (en) * | 2003-11-12 | 2005-05-26 | Nimcat Networks Inc. | Peer discovery |
US7673001B1 (en) * | 2003-11-21 | 2010-03-02 | Microsoft Corporation | Enterprise management of public instant message communications |
US20050113077A1 (en) * | 2003-11-24 | 2005-05-26 | Bushnell William J. | System for providing interoperability of call pickup service in a proprietary enterprise communication network and a cellular communication network |
US20050192893A1 (en) | 2003-11-24 | 2005-09-01 | Keeling John E. | Authenticated messaging-based transactions |
ATE359646T1 (en) * | 2003-12-08 | 2007-05-15 | Research In Motion Ltd | METHOD AND APPARATUS FOR IMMEDIATE INFORMATION |
GB2409787B (en) * | 2003-12-29 | 2007-10-03 | Nokia Corp | A communications system |
US7804949B2 (en) * | 2003-12-31 | 2010-09-28 | Alcatel Lucent | Client-based integration of PBX and messaging systems |
US20050265318A1 (en) * | 2004-01-08 | 2005-12-01 | Nokia Corporation | Apparatus, system, and method for rejecting a session establishment request |
US8250150B2 (en) * | 2004-01-26 | 2012-08-21 | Forte Internet Software, Inc. | Methods and apparatus for identifying and facilitating a social interaction structure over a data packet network |
US7269590B2 (en) * | 2004-01-29 | 2007-09-11 | Yahoo! Inc. | Method and system for customizing views of information associated with a social network user |
US7376670B2 (en) * | 2004-02-20 | 2008-05-20 | Alcatel-Lucent | System and method for provisioning presence application services |
CA2498641C (en) | 2004-02-27 | 2012-10-30 | Oz Communications | Interworking gateway and method |
JP4317061B2 (en) * | 2004-03-16 | 2009-08-19 | 株式会社日立製作所 | Presence information sharing method and system |
US7680888B1 (en) * | 2004-03-31 | 2010-03-16 | Google Inc. | Methods and systems for processing instant messenger messages |
US7764637B2 (en) * | 2004-04-05 | 2010-07-27 | Daniel J. LIN | Peer-to-peer mobile instant messaging method and device |
US20050228680A1 (en) * | 2004-04-08 | 2005-10-13 | Malik Dale W | Guest account architecture |
US20050267984A1 (en) | 2004-04-14 | 2005-12-01 | Jose Costa-Requena | Method and apparatus for interoperability and relay for WV and IMS group management services |
US8640035B2 (en) | 2004-06-24 | 2014-01-28 | Oracle America, Inc. | Identity based user interface |
US20060036712A1 (en) * | 2004-07-28 | 2006-02-16 | Morris Robert P | System and method for providing and utilizing presence information |
US20060026237A1 (en) * | 2004-07-30 | 2006-02-02 | Wang Richard G | Method and system for instant message using HTTP URL technology |
US7840681B2 (en) * | 2004-07-30 | 2010-11-23 | International Business Machines Corporation | Method and apparatus for integrating wearable devices within a SIP infrastructure |
US8015019B1 (en) * | 2004-08-03 | 2011-09-06 | Google Inc. | Methods and systems for providing a document |
US8571011B2 (en) * | 2004-08-13 | 2013-10-29 | Verizon Business Global Llc | Method and system for providing voice over IP managed services utilizing a centralized data store |
US20060045124A1 (en) * | 2004-08-31 | 2006-03-02 | Kidsnet, Inc. | Method and apparatus for providing access controls to communication services |
US20060045042A1 (en) * | 2004-08-31 | 2006-03-02 | Aseem Sethi | System and method for presence in wireless networks |
US20060080130A1 (en) * | 2004-10-08 | 2006-04-13 | Samit Choksi | Method that uses enterprise application integration to provide real-time proactive post-sales and pre-sales service over SIP/SIMPLE/XMPP networks |
FR2877178A1 (en) * | 2004-10-26 | 2006-04-28 | France Telecom | Message filtering method for e.g. Internet network, involves verifying if filtering is defined in list of contacts of one client intended to receive message, and sending message to third client, upon positive verification |
WO2006048759A1 (en) * | 2004-11-08 | 2006-05-11 | Nokia Corporation | Method enabling sessions and applications in instant messaging and presence serviced |
US7505482B2 (en) * | 2004-11-15 | 2009-03-17 | At&T Intellectual Property I, L.P. | Application services infrastructure for next generation networks |
US20060168015A1 (en) * | 2004-11-30 | 2006-07-27 | Brian Fowler | Instant messenger as a web-based communicator |
US8176086B2 (en) * | 2004-11-30 | 2012-05-08 | Avaya Inc. | Methods and apparatus for determining a presence of a user |
US8099369B2 (en) * | 2004-12-08 | 2012-01-17 | Ngna, Llc | Method and system for securing content in media systems |
AU2005318933B2 (en) * | 2004-12-21 | 2011-04-14 | Emue Holdings Pty Ltd | Authentication device and/or method |
US8280957B2 (en) * | 2004-12-23 | 2012-10-02 | Alcatel Lucent | Presence system and method for event-driven presence subscription |
US20060153346A1 (en) * | 2005-01-11 | 2006-07-13 | Metro Enterprises, Inc. | On-line authentication registration system |
US20060173792A1 (en) * | 2005-01-13 | 2006-08-03 | Glass Paul H | System and method for verifying the age and identity of individuals and limiting their access to appropriate material |
US8700729B2 (en) * | 2005-01-21 | 2014-04-15 | Robin Dua | Method and apparatus for managing credentials through a wireless network |
US7848501B2 (en) * | 2005-01-25 | 2010-12-07 | Microsoft Corporation | Storage abuse prevention |
US7571249B2 (en) * | 2005-04-15 | 2009-08-04 | Alcatel Lucent | System and method for routing communication sessions based on priority, presence and preference information |
US7684356B2 (en) * | 2005-04-22 | 2010-03-23 | Alcatel Lucent | System and method for providing hotline and preemption features in real-time communications using presence and preference information |
US20060265508A1 (en) * | 2005-05-02 | 2006-11-23 | Angel Franklin J | System for administering a multiplicity of namespaces containing state information and services |
KR101245915B1 (en) * | 2005-05-25 | 2013-03-20 | 텔레폰악티에볼라겟엘엠에릭슨(펍) | Method and apparatus for identifying an ims service |
US20060266823A1 (en) * | 2005-05-31 | 2006-11-30 | Selvin Passen | Authentication method and system for use in vending a restricted product or service |
US20060291378A1 (en) | 2005-06-28 | 2006-12-28 | Alcatel | Communication path redundancy protection systems and methods |
US20070005725A1 (en) * | 2005-06-30 | 2007-01-04 | Morris Robert P | Method and apparatus for browsing network resources using an asynchronous communications protocol |
US7983228B1 (en) * | 2005-07-14 | 2011-07-19 | Nextel Communications Inc. | Integration of IP multimedia subsystem and a push-to-talk interoperability infrastructure |
US20070192140A1 (en) * | 2005-08-17 | 2007-08-16 | Medcommons, Inc. | Systems and methods for extending an information standard through compatible online access |
KR101159341B1 (en) * | 2005-08-19 | 2012-06-25 | 삼성전자주식회사 | System and method for managing xdm service information |
US20070061405A1 (en) * | 2005-09-15 | 2007-03-15 | Keohane Susann M | Automatically setting an avoidance threshold and adjusting a chat presence based on user avoidance of chat sessions |
US7925786B2 (en) * | 2005-09-16 | 2011-04-12 | Microsoft Corp. | Hosting of network-based services |
US8145717B2 (en) * | 2005-09-21 | 2012-03-27 | Siemens Enterprise Communications, Inc. | System and method for providing presence age information in a unified communication system |
US20070100944A1 (en) * | 2005-10-28 | 2007-05-03 | Microsoft Corporation | Uniform resource identifier decoration to enable connectivity for instant messaging providers serving non-authoritative namespaces |
US7983404B1 (en) * | 2005-10-31 | 2011-07-19 | At&T Intellectual Property Ii, L.P. | Method and apparatus for providing presence status of multiple communication device types |
US7853245B2 (en) * | 2005-11-08 | 2010-12-14 | Research In Motion Limited | System and methods for wireless messaging |
US7685291B2 (en) | 2005-11-08 | 2010-03-23 | Mediatek Inc. | Messaging service interoperability methods and related devices |
WO2007061946A2 (en) * | 2005-11-18 | 2007-05-31 | Lu Larry L | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US20070124386A1 (en) * | 2005-11-21 | 2007-05-31 | Research In Motion Limited | Method for regulating instant messaging traffic |
US7991895B2 (en) * | 2005-12-09 | 2011-08-02 | Nokia Corporation | Limiting access to network functions based on personal characteristics of the user |
US8559350B2 (en) * | 2005-12-20 | 2013-10-15 | Microsoft Corporation | Mechanism to convey discovery information in a wireless network |
US8234559B2 (en) * | 2006-03-31 | 2012-07-31 | Microsoft Corporation | Managing rich presence collections |
US8804573B2 (en) * | 2006-06-15 | 2014-08-12 | Oracle International Corporation | Method and system for inferring presence of a principal based on past presence information |
US20080059627A1 (en) * | 2006-08-29 | 2008-03-06 | Hamalainen Jari P | Unified contact database |
US8218736B1 (en) | 2006-12-07 | 2012-07-10 | Callwave, Inc. | Methods and systems for confirming message delivery |
US20080222271A1 (en) * | 2007-03-05 | 2008-09-11 | Cary Spires | Age-restricted website service with parental notification |
-
2006
- 2006-11-20 WO PCT/US2006/044884 patent/WO2007061946A2/en active Application Filing
- 2006-11-20 US US11/561,886 patent/US20070162600A1/en not_active Abandoned
- 2006-11-20 US US11/561,877 patent/US8996620B2/en active Active
- 2006-11-20 US US11/561,880 patent/US9392069B2/en not_active Expired - Fee Related
- 2006-11-20 US US11/561,882 patent/US8396922B2/en active Active
-
2013
- 2013-03-05 US US13/786,350 patent/US20130185358A1/en not_active Abandoned
-
2016
- 2016-06-24 US US15/191,752 patent/US9825889B2/en active Active
-
2017
- 2017-11-20 US US15/817,669 patent/US10645038B2/en not_active Expired - Fee Related
-
2020
- 2020-03-31 US US16/836,165 patent/US10904172B2/en active Active
- 2020-12-29 US US17/137,005 patent/US11902226B2/en active Active
Patent Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6370564B2 (en) * | 1996-06-11 | 2002-04-09 | Ameritech Services Inc | Computer system architecture and method for multi-user, real-time applications |
US6175854B1 (en) * | 1996-06-11 | 2001-01-16 | Ameritech Services, Inc. | Computer system architecture and method for multi-user, real-time applications |
US6505238B1 (en) * | 1999-08-19 | 2003-01-07 | International Business Machines Corporation | Method and system for implementing universal login via web browser |
US6807423B1 (en) * | 1999-12-14 | 2004-10-19 | Nortel Networks Limited | Communication and presence spanning multiple access networks |
US20030018726A1 (en) * | 2001-04-27 | 2003-01-23 | Low Sydney Gordon | Instant messaging |
US20030131061A1 (en) * | 2001-11-28 | 2003-07-10 | Active Buddy, Inc. | Transparent proxy server for instant messaging system and methods |
US20030212791A1 (en) * | 2002-04-23 | 2003-11-13 | Pickup Robert Barkley | Method and system for authorising electronic mail |
US20050044144A1 (en) * | 2002-04-29 | 2005-02-24 | Dale Malik | Instant messaging architecture and system for interoperability and presence management |
US20030220976A1 (en) * | 2002-05-21 | 2003-11-27 | Bellsouth Intellectual Property Corporation | Temporary contact alias system |
US20080168566A1 (en) * | 2002-05-21 | 2008-07-10 | At&T Delaware Intellectual Property, Inc., Formerly Known As Bellsouth Intl. Prop. Corp. | Group access management system |
US20050144246A1 (en) * | 2002-06-07 | 2005-06-30 | Malik Dale W. | Methods, systems, and computer program products for delivering time-sensitive content |
US20040078447A1 (en) * | 2002-09-17 | 2004-04-22 | Malik Dale W. | User profiles for managing email and instant messaging (IM) |
US20090132726A1 (en) * | 2002-09-17 | 2009-05-21 | At&T Intellectual Property I, L.P. | Server-Based Message Protocol Translation |
US7487248B2 (en) * | 2002-10-08 | 2009-02-03 | Brian Moran | Method and system for transferring a computer session between devices |
US20040083297A1 (en) * | 2002-10-25 | 2004-04-29 | Yahoo!, Inc. | Centrally controllable instant messaging system |
US20040088546A1 (en) * | 2002-11-06 | 2004-05-06 | Imlogic, Inc | System and method for add-on services, secondary authentication, authorization and/or secure communication for dialog based protocols and systems |
US20050009517A1 (en) * | 2003-06-27 | 2005-01-13 | Oracle International Corporation, A California Corporation | Roaming across different access mechanisms and network technologies |
US20050172033A1 (en) * | 2003-07-11 | 2005-08-04 | Boban Mathew | Apparatus and method for multi-layer rule application within an integrated messaging platform |
US20050021651A1 (en) * | 2003-07-24 | 2005-01-27 | International Business Machines Corporation | Method and system for identification and presentation of statistical usage data for messaging systems |
US20050210112A1 (en) * | 2004-03-18 | 2005-09-22 | Clement Jason L | System and method for integrating multiple messaging systems |
US20050216550A1 (en) * | 2004-03-26 | 2005-09-29 | Paseman William G | Communication mode and group integration for social networks |
US20050227711A1 (en) * | 2004-03-31 | 2005-10-13 | France Telecom | Method and apparatus for creating, directing, storing and automatically delivering a message to an intended recipient upon arrival of a specified mobile object at a designated location |
US20060083192A1 (en) * | 2004-10-01 | 2006-04-20 | Gabriela Dinescu | Communication traffic control methods and systems |
US7450531B2 (en) * | 2004-10-26 | 2008-11-11 | Cisco Technology, Inc. | System and method for allocating and distributing end user information in a network environment |
Non-Patent Citations (1)
Title |
---|
TechTerms.com, Domain, January 16, 2013. Page 1. * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070162555A1 (en) * | 2005-11-18 | 2007-07-12 | Aol Llc | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US8996620B2 (en) * | 2005-11-18 | 2015-03-31 | Aol Inc. | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US9392069B2 (en) | 2005-11-18 | 2016-07-12 | Aol Inc. | Promoting interoperability of presence-based systems through the use of ubiquitous online identities |
US9825889B2 (en) | 2005-11-18 | 2017-11-21 | Oath Inc. | Presence-based systems and methods using electronic messaging activity data |
US8677451B1 (en) | 2010-06-22 | 2014-03-18 | Cellco Partnership | Enabling seamless access to a domain of an enterprise |
US20120136943A1 (en) * | 2010-11-25 | 2012-05-31 | Infosys Technologies Limited | Method and system for seamless interaction and content sharing across multiple networks |
US8676908B2 (en) * | 2010-11-25 | 2014-03-18 | Infosys Limited | Method and system for seamless interaction and content sharing across multiple networks |
Also Published As
Publication number | Publication date |
---|---|
US20070162555A1 (en) | 2007-07-12 |
US20210119947A1 (en) | 2021-04-22 |
US9392069B2 (en) | 2016-07-12 |
US9825889B2 (en) | 2017-11-21 |
US10645038B2 (en) | 2020-05-05 |
US20070156827A1 (en) | 2007-07-05 |
US11902226B2 (en) | 2024-02-13 |
US20180077091A1 (en) | 2018-03-15 |
US20160308797A1 (en) | 2016-10-20 |
WO2007061946A3 (en) | 2009-04-30 |
US20070156826A1 (en) | 2007-07-05 |
US8396922B2 (en) | 2013-03-12 |
US8996620B2 (en) | 2015-03-31 |
US20130185358A1 (en) | 2013-07-18 |
US20200228475A1 (en) | 2020-07-16 |
WO2007061946A2 (en) | 2007-05-31 |
US10904172B2 (en) | 2021-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10904172B2 (en) | Presence-based systems and methods using electronic messaging activity data | |
US7117528B1 (en) | Contested account registration | |
KR100950894B1 (en) | Method and system for registering and automatically retrieving digital-certificates in voice over internet protocolVOIP communications | |
US20210409390A1 (en) | Multifactor authentication from messaging systems | |
JP4742903B2 (en) | Distributed authentication system and distributed authentication method | |
US7673001B1 (en) | Enterprise management of public instant message communications | |
EP1422904B1 (en) | Method and systems for sharing a network resource with a user without current access | |
US20090077649A1 (en) | Secure messaging system and method | |
US20080005119A1 (en) | Remotely updating a user status on a presence server | |
US7475240B2 (en) | System and method for add-on services, secondary authentication, authorization and/or secure communication for dialog based protocols and systems | |
US20040167966A1 (en) | Method and system for directing communications in a communications network | |
US20130019295A1 (en) | Method and system for open authentication | |
US20100024019A1 (en) | Authentication | |
US20070100944A1 (en) | Uniform resource identifier decoration to enable connectivity for instant messaging providers serving non-authoritative namespaces | |
RU2477014C2 (en) | Method of group annunciation in message exchange service based on session initiation protocol "sip" | |
US8250633B2 (en) | Techniques for flexible resource authentication | |
US20100077467A1 (en) | Authentication service for seamless application operation | |
EP2203867A1 (en) | Password management | |
WO2002013069A1 (en) | System and process for updating electronic messaging accounts | |
US20070050371A1 (en) | Interacting with an online database through a variety of communications media | |
JP6848275B2 (en) | Program, authentication system and authentication cooperation system | |
US20100175118A1 (en) | Access to service | |
CN115632805A (en) | Single sign-on method based on unified user management | |
CA2601654A1 (en) | Secure messaging system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: AOL LLC, VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LU, LARRY L.;REEL/FRAME:019059/0746 Effective date: 20070315 |
|
AS | Assignment |
Owner name: BANK OF AMERICAN, N.A. AS COLLATERAL AGENT, TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:AOL INC.;AOL ADVERTISING INC.;BEBO, INC.;AND OTHERS;REEL/FRAME:023649/0061 Effective date: 20091209 Owner name: BANK OF AMERICAN, N.A. AS COLLATERAL AGENT,TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:AOL INC.;AOL ADVERTISING INC.;BEBO, INC.;AND OTHERS;REEL/FRAME:023649/0061 Effective date: 20091209 |
|
AS | Assignment |
Owner name: AOL INC., VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AOL LLC;REEL/FRAME:023723/0645 Effective date: 20091204 Owner name: AOL INC.,VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AOL LLC;REEL/FRAME:023723/0645 Effective date: 20091204 |
|
AS | Assignment |
Owner name: YEDDA, INC, VIRGINIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:BANK OF AMERICA, N A;REEL/FRAME:025323/0416 Effective date: 20100930 Owner name: TRUVEO, INC, CALIFORNIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:BANK OF AMERICA, N A;REEL/FRAME:025323/0416 Effective date: 20100930 Owner name: TACODA LLC, NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:BANK OF AMERICA, N A;REEL/FRAME:025323/0416 Effective date: 20100930 Owner name: SPHERE SOURCE, INC, VIRGINIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:BANK OF AMERICA, N A;REEL/FRAME:025323/0416 Effective date: 20100930 Owner name: QUIGO TECHNOLOGIES LLC, NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:BANK OF AMERICA, N A;REEL/FRAME:025323/0416 Effective date: 20100930 Owner name: NETSCAPE COMMUNICATIONS CORPORATION, VIRGINIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:BANK OF AMERICA, N A;REEL/FRAME:025323/0416 Effective date: 20100930 Owner name: MAPQUEST, INC, COLORADO Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:BANK OF AMERICA, N A;REEL/FRAME:025323/0416 Effective date: 20100930 Owner name: LIGHTNINGCAST LLC, NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:BANK OF AMERICA, N A;REEL/FRAME:025323/0416 Effective date: 20100930 Owner name: GOING INC, MASSACHUSETTS Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:BANK OF AMERICA, N A;REEL/FRAME:025323/0416 Effective date: 20100930 Owner name: AOL ADVERTISING INC, NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:BANK OF AMERICA, N A;REEL/FRAME:025323/0416 Effective date: 20100930 Owner name: AOL INC, VIRGINIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:BANK OF AMERICA, N A;REEL/FRAME:025323/0416 Effective date: 20100930 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, ILLINOIS Free format text: SECURITY AGREEMENT;ASSIGNORS:AOL INC.;AOL ADVERTISING INC.;BUYSIGHT, INC.;AND OTHERS;REEL/FRAME:030936/0011 Effective date: 20130701 Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT Free format text: SECURITY AGREEMENT;ASSIGNORS:AOL INC.;AOL ADVERTISING INC.;BUYSIGHT, INC.;AND OTHERS;REEL/FRAME:030936/0011 Effective date: 20130701 |
|
AS | Assignment |
Owner name: AOL INC., NEW YORK Free format text: RELEASE OF SECURITY INTEREST IN PATENT RIGHTS -RELEASE OF 030936/0011;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:036042/0053 Effective date: 20150623 Owner name: BUYSIGHT, INC., NEW YORK Free format text: RELEASE OF SECURITY INTEREST IN PATENT RIGHTS -RELEASE OF 030936/0011;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:036042/0053 Effective date: 20150623 Owner name: AOL ADVERTISING INC., NEW YORK Free format text: RELEASE OF SECURITY INTEREST IN PATENT RIGHTS -RELEASE OF 030936/0011;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:036042/0053 Effective date: 20150623 Owner name: PICTELA, INC., NEW YORK Free format text: RELEASE OF SECURITY INTEREST IN PATENT RIGHTS -RELEASE OF 030936/0011;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:036042/0053 Effective date: 20150623 Owner name: MAPQUEST, INC., NEW YORK Free format text: RELEASE OF SECURITY INTEREST IN PATENT RIGHTS -RELEASE OF 030936/0011;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:036042/0053 Effective date: 20150623 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |
|
AS | Assignment |
Owner name: VERIZON PATENT AND LICENSING INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VERIZON MEDIA INC.;REEL/FRAME:057453/0431 Effective date: 20210801 |
|
AS | Assignment |
Owner name: VERIZON MEDIA INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OATH INC.;REEL/FRAME:063488/0709 Effective date: 20201005 Owner name: OATH INC., NEW YORK Free format text: CHANGE OF NAME;ASSIGNOR:AOL INC.;REEL/FRAME:063490/0463 Effective date: 20170612 |