×

Methods and systems for controlling access to presence information according to a variety of different access permission types

  • US 7,636,753 B2
  • Filed: 10/27/2004
  • Issued: 12/22/2009
  • Est. Priority Date: 02/29/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method in a computer system for controlling access to presence information of a first computer system, wherein the presence information comprises at least a first indication of an availability of the first computer system and a second indication of an availability associated with a user of the first computer system, the method comprising:

  • receiving from a first computer system a request to set access permission for a second computer system to access the presence information of the first computer system, the access permission indicating whether the second computer system has subscription access permission and whether the second computer system has presence access permission; and

    setting the subscription access permission and the presence access permission according to the request received from the first computer system;

    receiving a request from the second computer system to subscribe to the presence information of the first computer system;

    determining whether the second computer system has subscription access permission to the first computer system;

    when the second computer system does not have the subscription access permission, sending a response to the second computer system denying the request to subscribe to the presence information of the first computer system;

    when the second computer system has the subscription access permission, determining whether the second computer system has the presence access permission to the first computer system;

    when the second computer system has the presence access permission to the first computer system, providing to the second computer system accurate presence information of the first computer system; and

    when the second computer system does not have the presence access permission, computing always manufacturing inaccurate presence information of the first computer system based on and contrary to different from the accurate presence information of the first computer system, and providing to the second computer system the computed manufactured inaccurate presence information, wherein the manufactured inaccurate presence information comprises information that indicates the user of the first computer system has not recently used the first computer system when the user has recently used the computer system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×