Methods and systems for developing an instant messaging network
First Claim
Patent Images
1. A system comprising:
- a server connected to a communication network; and
a processor of the server to execute logic operable on the server enabling a first user to browse contacts associated with a second user, wherein the logic enables the second user to act as an intermediary client between the first user and a third user in response to a request by the first user to add the third user, which is a contact associated with the second user, as a contact of the first user.
2 Assignments
0 Petitions
Accused Products
Abstract
An instant messaging (IM) system has an IM server connected to a communication network, and logic operable on the IM server enabling a first user to browse contacts associated with a second user. In some cases the first user can add and list contacts accessed by browsing the contacts associated with the second user.
17 Citations
32 Claims
-
1. A system comprising:
-
a server connected to a communication network; and a processor of the server to execute logic operable on the server enabling a first user to browse contacts associated with a second user, wherein the logic enables the second user to act as an intermediary client between the first user and a third user in response to a request by the first user to add the third user, which is a contact associated with the second user, as a contact of the first user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for expanding a communication system comprising:
-
browsing, using a first client, screen names in a contact list of the second client, wherein the second client acts as an intermediary between the first client and a third client in response to a request by the first client to add the third client, which is a contact in the contact list of the second client, as a contact in a contact list of the first client; and adding the third client as a contact to a contact list of the first client. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A non-transitory machine-readable storage medium comprising instructions that when executed, perform operations comprising:
-
browsing, using a first client, screen names in a contact list of the second client, wherein the second client acts as an intermediary between the first client and a third client in response to a request by the first client to add the third client, which is a contact in the contact list of the second client, as a contact in a contact list of the first client; and adding the third client as a contact to a contact list of the first client.
-
-
24. A system comprising:
-
a server connected to a communication network; and a processor of the server to execute logic that enables a first user to browse contacts of a second user, wherein the logic allows an exchange of information between the first user and a third user if the first user and the third user are each contacts of the second user, wherein the exchange of information includes a request received by the third user such that the first user becomes a contact of the third user when the third user accepts the request. - View Dependent Claims (25, 26, 27)
-
-
28. A method comprising:
executing, by a server connected to a communication network, logic that enables a first user to browse contacts of a second user, wherein the logic allows an exchange of information between the first user and a third user if the first user and the third user are each contacts of the second user, wherein the exchange of information includes a request received by the third user such that the first user becomes a contact of the third user when the third user accepts the request. - View Dependent Claims (29, 30, 31)
-
32. A non-transitory machine-readable storage medium comprising instructions that, when executed, perform operations comprising:
executing logic that enables a first user to browse contacts of a second user, wherein the logic allows an exchange of information between the first user and a third user if the first user and the third user are each contacts of the second user, wherein the exchange of information includes a request received by the third user such that the first user becomes a contact of the third user when the third user accepts the request.
Specification