USER ALIASES IN A COMMUNICATION SYSTEM
6 Assignments
0 Petitions
Accused Products
Abstract
A technique is disclosed in the context of a communications system whereby parties accessible through the system may be referenced by multiple alternative symbolic names. User profile information for a given party may be maintained in the system to control features and routing behavior in response to session request involving the party. By virtue of a mapping capability, one or more symbolic names may be associated with the same user profile information. A session request involving any of the alternative names for a party will evoke the same user profile.
49 Citations
24 Claims
-
1-4. -4. (canceled)
-
5. A method comprising:
-
receiving requests to establish communication with a user, where a first request, of the received requests, includes first identification information, where a second request, of the received requests, includes second identification information that is different than the first identification information, where the first identification information and the second identification information are associated with a single index, and where the first identification information and the second identification information are associated with a same type of communication; retrieving, using the single index, a profile of the user; and establishing the communications with the user based on the retrieved profile. - View Dependent Claims (6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory computer readable medium comprising:
-
one or more instructions, which when executed by a processor, cause the processor to receive information identifying a period of time for enabling communications that identify first identification information, where the first identification information is associated with a user; one or more instructions, which when executed by the processor, cause the processor to enable, during the period of time, first communications that identify the first identification information; and one or more instructions, which when executed by the processor, cause the processor to disable second communications that identifying the first identification information, after the period of time, one or more instructions, which when executed by the processor, cause the processor to enable communications, that identify second identification information, during the period of time and after the period of time, where the second identification information is associated with the user. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A device comprising:
-
a memory to store instructions; and a processor to execute the instructions to; receive requests to establish communications with a user, where a first request, of the received requests, includes first identification information, where a second request, of the received requests, includes second identification information that is different than the first identification information, and where the first identification information and the second identification information are associated with a single index, retrieve, using the single index, a profile of the user, and establish the communications with the user based on the retrieved profile. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification