Methods and systems for controlling access to presence information according to a variety of different access permission types
First Claim
1. A method in a computer system for controlling access to presence information of a first computer system, wherein the presence information comprises at least a first indication of an availability of the first computer system and a second indication of an availability associated with a user of the first computer system, the method comprising:
- receiving from a first computer system a request to set access permission for a second computer system to access the presence information of the first computer system, the access permission indicating whether the second computer system has subscription access permission and whether the second computer system has presence access permission; and
setting the subscription access permission and the presence access permission according to the request received from the first computer system;
receiving a request from the second computer system to subscribe to the presence information of the first computer system;
determining whether the second computer system has subscription access permission to the first computer system;
when the second computer system does not have the subscription access permission, sending a response to the second computer system denying the request to subscribe to the presence information of the first computer system;
when the second computer system has the subscription access permission, determining whether the second computer system has the presence access permission to the first computer system;
when the second computer system has the presence access permission to the first computer system, providing to the second computer system accurate presence information of the first computer system; and
when the second computer system does not have the presence access permission, computing always manufacturing inaccurate presence information of the first computer system based on and contrary to different from the accurate presence information of the first computer system, and providing to the second computer system the computed manufactured inaccurate presence information, wherein the manufactured inaccurate presence information comprises information that indicates the user of the first computer system has not recently used the first computer system when the user has recently used the computer system.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems are described for controlling access to presence information using a plurality of different access permission types. Presence information is maintained over a computer network and describes availability of computers and associated users over that network. For example, instant messaging applications often involve maintaining presence information. Users control access to presence information using a number of different access permission types such as the right to view accurate presence information, the right to view any presence information, or the right to act on accessed presence information. By using several different access permission types, the present invention enables finer control over access to presence information.
-
Citations
24 Claims
-
1. A method in a computer system for controlling access to presence information of a first computer system, wherein the presence information comprises at least a first indication of an availability of the first computer system and a second indication of an availability associated with a user of the first computer system, the method comprising:
-
receiving from a first computer system a request to set access permission for a second computer system to access the presence information of the first computer system, the access permission indicating whether the second computer system has subscription access permission and whether the second computer system has presence access permission; and setting the subscription access permission and the presence access permission according to the request received from the first computer system; receiving a request from the second computer system to subscribe to the presence information of the first computer system; determining whether the second computer system has subscription access permission to the first computer system; when the second computer system does not have the subscription access permission, sending a response to the second computer system denying the request to subscribe to the presence information of the first computer system; when the second computer system has the subscription access permission, determining whether the second computer system has the presence access permission to the first computer system; when the second computer system has the presence access permission to the first computer system, providing to the second computer system accurate presence information of the first computer system; and when the second computer system does not have the presence access permission, computing always manufacturing inaccurate presence information of the first computer system based on and contrary to different from the accurate presence information of the first computer system, and providing to the second computer system the computed manufactured inaccurate presence information, wherein the manufactured inaccurate presence information comprises information that indicates the user of the first computer system has not recently used the first computer system when the user has recently used the computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-readable storage medium containing instructions for causing a server computer system to control access to presence information of a first computer system, wherein the presence information comprises at least a first indication of an availability of the first computer system and a second indication of an availability associated with a user of the first computer system, by a method comprising:
-
receiving from setting by a user of the first computer system a request to set access permission for a second computer system to access the presence information of the first computer system, the access permission indicating whether the second computer system has subscription access permission and, when the second computer system has subscription access permission, whether the second computer system has presence access permission; upon receiving a request from the second computer system to subscribe to the presence information of the first computer system, determining whether the access permission indicates that the second computer system has the subscription access permission; when the second computer system does not have the subscription access permission, sending a response to the second computer system denying the request to subscribe to the presence information of the first computer system; when the second computer system has the subscription access permission, determining whether the second computer system has the presence access permission; and when the second computer system does not have the presence access permission, computing always manufacturing inaccurate presence information of the first computer system based on and contrary to different from the accurate presence information, and providing to the second computer system the manufactured inaccurate presence information, wherein the manufactured inaccurate presence information comprises information that indicates the user of the first computer system has not recently used the first computer system when the user has recently used the computer system. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A computer system for maintaining presence information and exercising control of access to the presence information, wherein the presence information comprises at least a first indication of an availability of the first computer system and a second indication of an availability associated with a user of the first computer system, comprising:
-
a component that sets access permission for a second computer system to access the presence information of the first computer system, the access permission specifiable by a user of the first computer system, the access permission indicating whether the second computer system has subscription access permission and whether the second computer system has presence access permission; a component that receives a request from the second computer system to subscribe to the presence information of the first computer system; a component that denies the request if the access permission indicates that the second computer system does not have the subscription access permission; a component that determines whether the second computer system has the presence access permission if the access permission indicates that the second computer system has the subscription access permission; a component that provides to the second computer system accurate presence information of the first computer system when the second computer system has presence access permission; and a component that computes always manufactures inaccurate presence information of the first computer system based on and different from the accurate presence information and provides to the second computer system the computed manufactured inaccurate presence information when the second computer system does not have presence access permission wherein the inaccurate presence information is contrary to the accurate presence information, wherein the manufactured inaccurate presence information comprises information that indicates the user of the first computer system has not recently used the first computer system when the user has recently used the computer system. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
Specification