User aliases in a communication system
First Claim
Patent Images
1. A method comprising:
- receiving, by a processor, requests to establish communications with a device associated with a user,a first request, of the received requests, including first identification information,a second request, of the received requests, including second identification information that is different than the first identification information,the first identification information and the second identification information identifying the user,the first identification information and the second identification information being associated with a single index,the first identification information including a first Internet Protocol (IP) address and the second identification information including a second IP address, andthe first identification information and the second identification information being associated with a same type of communication,the communications including one or more calls from one or more other devices;
retrieving, by the processor and from a first data structure, the single index using the first identification information and the second identification information;
retrieving, by the processor and using the single index, a profile of the user from a second data structure that is different than the first data structure;
determining, by the processor and based on the retrieved profile, whether to establish the communications with the device associated with the user; and
establishing, by the processor, the communications with the device associated with the user based on determining whether to establish the communications with the device associated with the user,establishing the communications including;
establishing the one or more calls between the device associated with the user and the one or more other devices.
6 Assignments
0 Petitions
Accused Products
Abstract
A technique is disclosed in the context of a communications system whereby parties accessible through the system may be referenced by multiple alternative symbolic names. User profile information for a given party may be maintained in the system to control features and routing behavior in response to session request involving the party. By virtue of a mapping capability, one or more symbolic names may be associated with the same user profile information. A session request involving any of the alternative names for a party will evoke the same user profile.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by a processor, requests to establish communications with a device associated with a user, a first request, of the received requests, including first identification information, a second request, of the received requests, including second identification information that is different than the first identification information, the first identification information and the second identification information identifying the user, the first identification information and the second identification information being associated with a single index, the first identification information including a first Internet Protocol (IP) address and the second identification information including a second IP address, and the first identification information and the second identification information being associated with a same type of communication, the communications including one or more calls from one or more other devices; retrieving, by the processor and from a first data structure, the single index using the first identification information and the second identification information; retrieving, by the processor and using the single index, a profile of the user from a second data structure that is different than the first data structure; determining, by the processor and based on the retrieved profile, whether to establish the communications with the device associated with the user; and establishing, by the processor, the communications with the device associated with the user based on determining whether to establish the communications with the device associated with the user, establishing the communications including; establishing the one or more calls between the device associated with the user and the one or more other devices. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable device storing instructions, the instructions comprising:
-
one or more instructions which, when executed by a processor, cause the processor to receive information identifying a period of time for enabling communications that identify first identification information, the first identification information identifying a user, the first identification information including a telephone number or an Internet Protocol (IP) address; one or more instructions which, when executed by the processor, cause the processor to enable, during the period of time, first communications that identify the first identification information, the one or more instructions to enable the first communications including; one or more instructions to cause one or more calls to be established between a device associated with the user and a device associated with another user; one or more instructions which, when executed by the processor, cause the processor to disable second communications that identify the first identification information, after the period of time; and one or more instructions which, when executed by the processor, cause the processor to enable communications, that identify second identification information, during the period of time and after the period of time, the second identification information identifying the user, and the second identification information being different than the first identification information. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A device comprising:
-
a memory to store instructions; and a processor to execute the instructions to; receive requests to establish communications with a device associated with a user, a first request, of the received requests, including first identification information, a second request, of the received requests, including second identification information that is different than the first identification information, the first identification information and the second identification information identifying the user, and the first identification information and the second identification information being associated with a single index, the first identification information including an Internet Protocol (IP) address or a telephone number, the communications including one or more calls from one or more other devices associated with one or more other users, retrieving, from a first data structure, the single index using the first identification information and the second identification information; retrieve, from a second data structure and using the single index, a profile of the user, determine whether to establish the communications with the device associated with the user based on the retrieved profile, transmit information indicating that the requests are denied when the communications are not to be established with the device associated with the user, and establish the communications with the device associated with the user when the communications are to be established with the device, when establishing the communications, the processor is to; cause the one or more calls to be established between the device, associated with the user, and the one or more other devices associated with the one or more other users. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification