Promoting interoperability of presence-based systems through the use of ubiquitous online identities
First Claim
Patent Images
1. A computer-implemented method comprising the following operations performed by one or more processors:
- enabling access to a first instant messaging service using an online identity of a user that is associated with a second instant messaging service, wherein enabling access to the first instant messaging service comprises authenticating the online identity of the user;
sending a request to receive publication rules, the publication rules comprising an identifier of at least one other instant messaging service in a list of interoperable instant messaging services, and data indicating that the at least one other instant messaging service associated with the identifier is permitted to receive presence information regarding the use of the online identity by the user to access the first instant messaging service;
receiving the publication rules;
consulting the publication rules to determine that the at least one other instant messaging service is permitted to receive presence information;
providing, in response to consulting the publication rules and determining that the at least one other instant messaging service is permitted to receive presence information, the at least one other instant messaging service with the presence information regarding the use of the online identity to access the first instant messaging service;
detecting new presence information for the online identity; and
providing, to the at least one other instant messaging service, the new presence information and an identity of a type of client device used by the user.
9 Assignments
0 Petitions
Accused Products
Abstract
Access to a first instant messaging service using an online identity that is associated with a second instant messaging service is enabled. A profile is accessed. The profile indicates that another instant messaging service is to be provided with presence information regarding the use of the online identity to access the first instant messaging service. The other instant messaging service is provided with the presence information regarding the use of the online identity to access the first instant messaging service.
-
Citations
39 Claims
-
1. A computer-implemented method comprising the following operations performed by one or more processors:
-
enabling access to a first instant messaging service using an online identity of a user that is associated with a second instant messaging service, wherein enabling access to the first instant messaging service comprises authenticating the online identity of the user; sending a request to receive publication rules, the publication rules comprising an identifier of at least one other instant messaging service in a list of interoperable instant messaging services, and data indicating that the at least one other instant messaging service associated with the identifier is permitted to receive presence information regarding the use of the online identity by the user to access the first instant messaging service; receiving the publication rules; consulting the publication rules to determine that the at least one other instant messaging service is permitted to receive presence information; providing, in response to consulting the publication rules and determining that the at least one other instant messaging service is permitted to receive presence information, the at least one other instant messaging service with the presence information regarding the use of the online identity to access the first instant messaging service; detecting new presence information for the online identity; and providing, to the at least one other instant messaging service, the new presence information and an identity of a type of client device used by the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A non-transitory computer-usable medium storing a computer program, the computer program comprising instructions for causing at least one processor to perform the following operations:
-
enabling access to a first instant messaging service using an online identity of a user that is associated with a second instant messaging service, wherein enabling access to the first instant messaging service comprises authenticating the online identity of the user; sending a request to receive publication rules, the publication rules comprising an identifier of at least one other instant messaging service in a list of interoperable instant messaging services, and data indicating that the at least one other instant messaging service associated with the identifier is permitted to receive presence information regarding the use of the online identity by the user to access the first instant messaging service; receiving publication rules; consulting the publication rules to determine that the at least one other instant messaging service is permitted to receive presence information; providing, in response to consulting the publication rules and determining that the at least one other instant messaging service is permitted to receive presence information, the at least one other instant messaging service with the presence information regarding the use of the online identity to access the first instant messaging service; detecting new presence information for the online identity; and providing, to the at least one other instant messaging service, the new presence information and an identity of a type of client device used by the user. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39)
-
Specification