CA2634220A1 - Contact list display system and method - Google Patents
Contact list display system and method Download PDFInfo
- Publication number
- CA2634220A1 CA2634220A1 CA002634220A CA2634220A CA2634220A1 CA 2634220 A1 CA2634220 A1 CA 2634220A1 CA 002634220 A CA002634220 A CA 002634220A CA 2634220 A CA2634220 A CA 2634220A CA 2634220 A1 CA2634220 A1 CA 2634220A1
- Authority
- CA
- Canada
- Prior art keywords
- network
- low level
- networks
- contacts
- level network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/216—Handling conversation history, e.g. grouping of messages in sessions or threads
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/542—Event management; Broadcasting; Multicasting; Notifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/043—Real-time or near real-time messaging, e.g. instant messaging [IM] using or handling presence information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/40—Support for services or applications
- H04L65/403—Arrangements for multi-party communication, e.g. for conferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1044—Group management mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/563—Data redirection of data network streams
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/565—Conversion or adaptation of application format or content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/487—Arrangements for providing information services, e.g. recorded voice services or time announcements
- H04M3/493—Interactive information services, e.g. directory enquiries ; Arrangements therefor, e.g. interactive voice response [IVR] systems or voice portals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/06—Message adaptation to terminal or network requirements
- H04L51/066—Format adaptation, e.g. format conversion or compression
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
Abstract
A technique for contact list aggregation across networks involves logging into low level networks through a high level network. A system constructed according to the technique may include a network interface coupled to the different low level networks. The system may further include a contact aggregation engine coupled to the network interface and a network contacts database. In operation the system logs into one or more of the low level networks (or facilitates login for a user). To the extent that the data in the network contacts database is not current, the contact aggregation engine updates the networks contacts database contact information, then provides an aggregated contact list including the contact information to a display device. A
method according to the technique may include logging into a high level network and displaying contacts from the one or more low level networks in an aggregated contact list. The method may further include logging into the one or more low level networks.
method according to the technique may include logging into a high level network and displaying contacts from the one or more low level networks in an aggregated contact list. The method may further include logging into the one or more low level networks.
Description
' ~""= .~a.
CONTACT LIST DISPLAY SYSTEM AND METHOD
BACKGROUND
Instant messaging requires the use of a client prograni that hooks up an instant messa;ing service and differs from e-mail in that conversations are then able to happen in real time. Most services offer a presence information feature, indicating whether people on one's list of'contac.ts are currently online and available to chat. This inay he called a contact list. In early instant messaging programs, each letter appeared as it was typed. anii when letters were deleted to cot7-ect typos this was also seen in real time. 'rhis made it more like a telephone coiiversation than exchanging letters. In modem instant messaging programs, the other party in the conversation generally only sees each line of text right aher a new line is started. Most instant messaging applications also include the ability to set a status message, roughly analogous to the niessage on a telephone answering machine.
Popular instant messaging services on the public Internet include NET
Messenger Service, AOL Instant Messenger, Excite/Pal, Gadtt-Gadu, Google Talk, iChat, ICQ, Jabber, Qnext, QQ, Meetro, Skype, Trillian and Yahoo! Messenger. These services owe many ideas to an older (and still popular) online chat medium known as Internet Relay Chat (IRC).
The foregoing examples of the related art and limitations related therewith are intended to be illustrative and not exclusive. Other limitations of the related art will become apparent to those of skill in the art trpon a reading of the specification and a study of the drawings.
SUMMARY
The following embodiments and aspects thereof are described and illustrated in conjunetion with systenis, tools, and methods that are meant to be exemplary and illustrative, not limiting in scope. In various embodiments, one or more of the above-described problems have been reduced or eliminated, while other embodiments are directed to other improvenients.
A technique for contact list aggregation across a plurality of different networks involves logging into low level networks through a high level network. A system constructed according to the technique may incltide a network interface coupled to the different low level networks.
The system may fttrther include a cotitact aggregation engine coupled to the network interface and a netwot-k contacts database. In operation the system logs into one or more of the low level networks (or facilitates login for a user). The network contacts database rrtay include some inl'ormation about coiitacts associated with the networks fi-orn, by way of'exarnple bttt not 91004-0013/LEGAL 12877050.1 tA~-,,*~.
timitation, previous lobins ot- data explicitly entered by a tiser. To the cxtent that the data in the nvtwork colitacts database is not etn-rent, the contact ageruoation engine updates the networks contacts database contact infonnation, then provides an aggregated contact list including the cotttact infonuation to a display device.
A metiiod according to the technique may inclttde logging into a lligh level network anci displaying contacts trom the onc or more low level networks in an aggregated contact list. The mcthod ntay further inclu.de logging into thc one or mor=e low level networks.
13RIEF DESCRIPTION OF THE .DRAW INGS
Embodiments of the inventions are illustrated in the figures. However, the enibodiinents and Fgures are illustrative rather than limiting; they provide examples of the invention, FIG. I depicts an example of a system for providing instant messages to clients via a web interface.
FIG. 2 depicts an example of a system for displaying content from an IM client at an alternative IM. client.
FIG. 3 depicts an example of a system capable of contact aggregation and display.
FIGS. 4A-4B depict examples of screenshots that depicts a multi-network IM
display.
F1G. 5 depicts a flowchart of an example of a method for contact list aggregation and display.
FIG. 6 cicpicts a f]owchart of an example of a niethod for aggregated contact list display.
FIG. 7 depicts a computer system suitable for implementation of the techniques described with reference to FIGS. 1-6.
CONTACT LIST DISPLAY SYSTEM AND METHOD
BACKGROUND
Instant messaging requires the use of a client prograni that hooks up an instant messa;ing service and differs from e-mail in that conversations are then able to happen in real time. Most services offer a presence information feature, indicating whether people on one's list of'contac.ts are currently online and available to chat. This inay he called a contact list. In early instant messaging programs, each letter appeared as it was typed. anii when letters were deleted to cot7-ect typos this was also seen in real time. 'rhis made it more like a telephone coiiversation than exchanging letters. In modem instant messaging programs, the other party in the conversation generally only sees each line of text right aher a new line is started. Most instant messaging applications also include the ability to set a status message, roughly analogous to the niessage on a telephone answering machine.
Popular instant messaging services on the public Internet include NET
Messenger Service, AOL Instant Messenger, Excite/Pal, Gadtt-Gadu, Google Talk, iChat, ICQ, Jabber, Qnext, QQ, Meetro, Skype, Trillian and Yahoo! Messenger. These services owe many ideas to an older (and still popular) online chat medium known as Internet Relay Chat (IRC).
The foregoing examples of the related art and limitations related therewith are intended to be illustrative and not exclusive. Other limitations of the related art will become apparent to those of skill in the art trpon a reading of the specification and a study of the drawings.
SUMMARY
The following embodiments and aspects thereof are described and illustrated in conjunetion with systenis, tools, and methods that are meant to be exemplary and illustrative, not limiting in scope. In various embodiments, one or more of the above-described problems have been reduced or eliminated, while other embodiments are directed to other improvenients.
A technique for contact list aggregation across a plurality of different networks involves logging into low level networks through a high level network. A system constructed according to the technique may incltide a network interface coupled to the different low level networks.
The system may fttrther include a cotitact aggregation engine coupled to the network interface and a netwot-k contacts database. In operation the system logs into one or more of the low level networks (or facilitates login for a user). The network contacts database rrtay include some inl'ormation about coiitacts associated with the networks fi-orn, by way of'exarnple bttt not 91004-0013/LEGAL 12877050.1 tA~-,,*~.
timitation, previous lobins ot- data explicitly entered by a tiser. To the cxtent that the data in the nvtwork colitacts database is not etn-rent, the contact ageruoation engine updates the networks contacts database contact infonnation, then provides an aggregated contact list including the cotttact infonuation to a display device.
A metiiod according to the technique may inclttde logging into a lligh level network anci displaying contacts trom the onc or more low level networks in an aggregated contact list. The mcthod ntay further inclu.de logging into thc one or mor=e low level networks.
13RIEF DESCRIPTION OF THE .DRAW INGS
Embodiments of the inventions are illustrated in the figures. However, the enibodiinents and Fgures are illustrative rather than limiting; they provide examples of the invention, FIG. I depicts an example of a system for providing instant messages to clients via a web interface.
FIG. 2 depicts an example of a system for displaying content from an IM client at an alternative IM. client.
FIG. 3 depicts an example of a system capable of contact aggregation and display.
FIGS. 4A-4B depict examples of screenshots that depicts a multi-network IM
display.
F1G. 5 depicts a flowchart of an example of a method for contact list aggregation and display.
FIG. 6 cicpicts a f]owchart of an example of a niethod for aggregated contact list display.
FIG. 7 depicts a computer system suitable for implementation of the techniques described with reference to FIGS. 1-6.
2 91004-0013/LEGAL12877050.1 Ok 63017=8005. W001 DETAILED .DESCRIPTION
In the following description, several specific details are presented to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention can be pr~icticed Without one or more of the speciiic details. or in conihinauion wiih other components, etc. I.n other instances, well-known implementations or operations are not shown or di:scribecl in detail to avoid obscuring aspects of various embodiments, of the invention.
FIG. 1 depicts an example of a system 100 for providing instant messages to clients via a web interface. In the exam.ple of FIG. 1, the system 100 includes a network 102, a server 104, and an fnstant Messenger (IM) server 106, and an IM network 108. The server 104 is coupled to the network at least by way of port 80. The two way communi.cation via port 80 is represented in the example of FIG. I as an arrow 110. The server 104 is coupled to the IM
server 106 via one or more other ports. The two way coninitutication via the other ports is represented in the example of FIG. I as an arrow 112. The IM server 106 is coupled to the IM
network 108 via auy known or convenient mechanist.n. Indeed, the IM server 106 may be thought of as part of the IM
tietrivork 108. The network 102 couples a plurality of clients 114-1 to 114-N
(referred to collectively as clients 114) to the server 104. In the example of FIG. 1, the server 104 includes an event queue 116.
The network 102 may include by way of example but not limi.tation LAN, WAN, VLAN, WLAN. Internet, cellular network, phone network, radio network, or some other known or convenient network. The tet-m "Internet" as used herein refers to a network of netivorks that uses certain protocols, such as TCP/IP, atid possibly other protocols such as the hypertext transfer protocol (HTTP) for hypertext markup language (HTML) docunlents that make up the World Wide Web (tlie web). The physical connections of the lnternet and the protocols and communication procedures are well known, but any convenient physical connections or protocols could be used.
The server 104 may include a multiple servers. Indeed, it may be desirable, depending upon details of a particular implementation, to install several servers to cope with the number of siniultaneous users the systeni 100 supports. It may ftu-ther be desirable, depending upoti details of a particular implementation, for the server 104 to have a high CPLI
througllput, tocietlier with large amounts of RAM, to handle a large nuniber of users. It mav fiirther be clesirable, depending upon details of a particular imlalemerttation, to accomplish resource stiaring via thread handling where a pool of threads is shared and used bv one or more of the clients 114 for client-server communication and between the servei- 104 and the IM server 106.
In the following description, several specific details are presented to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention can be pr~icticed Without one or more of the speciiic details. or in conihinauion wiih other components, etc. I.n other instances, well-known implementations or operations are not shown or di:scribecl in detail to avoid obscuring aspects of various embodiments, of the invention.
FIG. 1 depicts an example of a system 100 for providing instant messages to clients via a web interface. In the exam.ple of FIG. 1, the system 100 includes a network 102, a server 104, and an fnstant Messenger (IM) server 106, and an IM network 108. The server 104 is coupled to the network at least by way of port 80. The two way communi.cation via port 80 is represented in the example of FIG. I as an arrow 110. The server 104 is coupled to the IM
server 106 via one or more other ports. The two way coninitutication via the other ports is represented in the example of FIG. I as an arrow 112. The IM server 106 is coupled to the IM
network 108 via auy known or convenient mechanist.n. Indeed, the IM server 106 may be thought of as part of the IM
tietrivork 108. The network 102 couples a plurality of clients 114-1 to 114-N
(referred to collectively as clients 114) to the server 104. In the example of FIG. 1, the server 104 includes an event queue 116.
The network 102 may include by way of example but not limi.tation LAN, WAN, VLAN, WLAN. Internet, cellular network, phone network, radio network, or some other known or convenient network. The tet-m "Internet" as used herein refers to a network of netivorks that uses certain protocols, such as TCP/IP, atid possibly other protocols such as the hypertext transfer protocol (HTTP) for hypertext markup language (HTML) docunlents that make up the World Wide Web (tlie web). The physical connections of the lnternet and the protocols and communication procedures are well known, but any convenient physical connections or protocols could be used.
The server 104 may include a multiple servers. Indeed, it may be desirable, depending upon details of a particular implementation, to install several servers to cope with the number of siniultaneous users the systeni 100 supports. It may ftu-ther be desirable, depending upoti details of a particular implementation, for the server 104 to have a high CPLI
througllput, tocietlier with large amounts of RAM, to handle a large nuniber of users. It mav fiirther be clesirable, depending upon details of a particular imlalemerttation, to accomplish resource stiaring via thread handling where a pool of threads is shared and used bv one or more of the clients 114 for client-server communication and between the servei- 104 and the IM server 106.
3 91004-0013; L E GAL 12877050.1 6.3017=8005WOU1 The server 104 may include one or more of an application servet', database server, web server, baiulers server, and content server, or any combination tliereof. 'fo rnake the most of the techniqucs described herein, the server 104 should, though is not required to, irtclude at least one application server. 'I'he other servers can 11ave supporting roles in, by way of example but not timitation. serving static content or advertising (e.g., banners), storing usage data, or fulflling some other known or convenient function.
The server 104 may act as a proxv server between the clients 1 t 4 and the IM
set-ver 106. The server 104 receives communications from the clients 114 on http port 80, and responds to the clients 114 on http port 80. Communications from the clients 114 that are bound for the [M network 108, however, must also come through http port 80 to the server 104, and are then 1"ottivarded to the IM server 106. In this way, ttie server 104 acts as a carrier of the data from users to the IM network 108 using a mechauism that controls attd manages the data (e.g., text niessages, display images, enioticons, audio/video streams, etc.) sent between one of the clients 114 and the sei-ver 104, and vice versa.
The IM server 106 may be any known or convenient IM sei-ver that is compatible with 1M. Events, messages, or other appropriate data from the IM server [06 are collected in the event queue 116 of the server 104. The everits may be collected in association with a variety of protocols including by way of example but not limitation port 1863, port 5050, port 5222, port 5190, etc.
The IM network 108 may include one or a conibination of networks selected from MSN
Messenger, Yahoo! Messenger, AIM AOL, ICQ, QQ, Jabber, Google Tatk, [RC, or some other known or convenient IM network.
The clients 114 may include any known or convenient device, including by way of example but not liniitation, a Web browser, mobile client, PDA, game console, TV box, native application, etc. I'he clients poll the server 104 for events. The events can be removed from the event queue 116 and translatect into text, JavaScript, XML, or some ottier known or convcnient format that one or more of the clients 114 need or expect in order to process data associated with the event.
T'o interact with the IM network 108, the clients 114 send data to the server 104. The data, which mav include commands, is processed and translated into corresponding data that will be seni to the appropriate IM network. In an enibodiinent., the appropr-iate IN/I network niav be detertninable based upon the protocol encoded in a message.
The server 104 may act as a proxv server between the clients 1 t 4 and the IM
set-ver 106. The server 104 receives communications from the clients 114 on http port 80, and responds to the clients 114 on http port 80. Communications from the clients 114 that are bound for the [M network 108, however, must also come through http port 80 to the server 104, and are then 1"ottivarded to the IM server 106. In this way, ttie server 104 acts as a carrier of the data from users to the IM network 108 using a mechauism that controls attd manages the data (e.g., text niessages, display images, enioticons, audio/video streams, etc.) sent between one of the clients 114 and the sei-ver 104, and vice versa.
The IM server 106 may be any known or convenient IM sei-ver that is compatible with 1M. Events, messages, or other appropriate data from the IM server [06 are collected in the event queue 116 of the server 104. The everits may be collected in association with a variety of protocols including by way of example but not limitation port 1863, port 5050, port 5222, port 5190, etc.
The IM network 108 may include one or a conibination of networks selected from MSN
Messenger, Yahoo! Messenger, AIM AOL, ICQ, QQ, Jabber, Google Tatk, [RC, or some other known or convenient IM network.
The clients 114 may include any known or convenient device, including by way of example but not liniitation, a Web browser, mobile client, PDA, game console, TV box, native application, etc. I'he clients poll the server 104 for events. The events can be removed from the event queue 116 and translatect into text, JavaScript, XML, or some ottier known or convcnient format that one or more of the clients 114 need or expect in order to process data associated with the event.
T'o interact with the IM network 108, the clients 114 send data to the server 104. The data, which mav include commands, is processed and translated into corresponding data that will be seni to the appropriate IM network. In an enibodiinent., the appropr-iate IN/I network niav be detertninable based upon the protocol encoded in a message.
4 91004-0013lL E GAL 12877050.1 63017-8005.WO0 i !vlessa<res or actions from the clients 114 are collected over network protocols such as, by way of example but not limitation, HTTP or plain socket connections. The messages or actions sire transfi:>rmed to an appropriate protocol format to be sent over a compliant port from tlic clicnts 114 to the server 104, with thc IM protocol on the application side. In a non-lim;ting tilc C;impliau port is hup pon 8it. Hu~~ever, tunypurt simiiar chai-acteristics to those of a typical port 80 could be used.
The latest available browsers, as of Deceinber 2005, enable the use of a techniqtle called AJAX (Asynchronous JavaScript And XML). With AJAX, appropriately configured clients 114 can e;tei:ute actions and poll for messages or events using only JavaScript.
The method is based on using an XMLF1ttpRequest object to make I-ITTP requests to th.e server 104.
The server 104 mav reply with messages taken from the qucue of the corresponding session in XML. (or another) format that are parsed and displayed according to the message content.
For clients 114 that include a browser, when accessing the server 104 the browser typically uses hidden HTML frames to update information on visible frames. The visible frames display appropriate inl'ormation while the hidden frames are reloaded in short periods of time. In each refresh thai hiis the server 104, the browser ident.ifes the current messaging session and checks ifnew event5 or niessages associated with the session are in the event queue 116. When flt:\~, lntUCIIt:1tWI1 ar:ives and needs to be clisplayed in sonie form, the bro\vser makes use of, for example, JavaScript code to update the visible frames and windows with new messages or events keeping the information up to date in the screen. In this way, automatic refreshing can take place in a hidden frame.
In another embodiment, certain of the clients 114 with browsers niay not nlake use of refreslies. For example, a form of updating the screen without using a refresh tecluiique is to keep one single HTTP socket request alive for the whole period of a messaging session without actually closing the socket connection. In this example, information is initially loaded and displayed in one single visible frame. While events aiid messages are being received by the server 104, JavaScript code can be injected into the HTML document through the same I-ITTP
socket kept alive and managed by the server 104. For each event or message, the browser can inteipret the JavaScript code injected and the co.tresponding parts of the HTNIL docuinent and windoWs will bc updated.
In another enibodiment, certain of the clients 114 with browsers may make use of manual refi=eshes. Some relatively unsophisticated browsers, such as WAP and xHTML
browsers often available on mobile p.hones, do not support hidden franies andlor JavaScript (and others may be contigured such that they do not support hidden frames andlor JavaScript). Tn
The latest available browsers, as of Deceinber 2005, enable the use of a techniqtle called AJAX (Asynchronous JavaScript And XML). With AJAX, appropriately configured clients 114 can e;tei:ute actions and poll for messages or events using only JavaScript.
The method is based on using an XMLF1ttpRequest object to make I-ITTP requests to th.e server 104.
The server 104 mav reply with messages taken from the qucue of the corresponding session in XML. (or another) format that are parsed and displayed according to the message content.
For clients 114 that include a browser, when accessing the server 104 the browser typically uses hidden HTML frames to update information on visible frames. The visible frames display appropriate inl'ormation while the hidden frames are reloaded in short periods of time. In each refresh thai hiis the server 104, the browser ident.ifes the current messaging session and checks ifnew event5 or niessages associated with the session are in the event queue 116. When flt:\~, lntUCIIt:1tWI1 ar:ives and needs to be clisplayed in sonie form, the bro\vser makes use of, for example, JavaScript code to update the visible frames and windows with new messages or events keeping the information up to date in the screen. In this way, automatic refreshing can take place in a hidden frame.
In another embodiment, certain of the clients 114 with browsers niay not nlake use of refreslies. For example, a form of updating the screen without using a refresh tecluiique is to keep one single HTTP socket request alive for the whole period of a messaging session without actually closing the socket connection. In this example, information is initially loaded and displayed in one single visible frame. While events aiid messages are being received by the server 104, JavaScript code can be injected into the HTML document through the same I-ITTP
socket kept alive and managed by the server 104. For each event or message, the browser can inteipret the JavaScript code injected and the co.tresponding parts of the HTNIL docuinent and windoWs will bc updated.
In another enibodiment, certain of the clients 114 with browsers may make use of manual refi=eshes. Some relatively unsophisticated browsers, such as WAP and xHTML
browsers often available on mobile p.hones, do not support hidden franies andlor JavaScript (and others may be contigured such that they do not support hidden frames andlor JavaScript). Tn
5 91004-0013.'L F GAL 128 7 7050.1 Oft 63017-8005, WO01 such cases, the inforniation displayed ttas to b(: updated manually by the user. ManuaI updating cnables any mobile phone, PDA, TV Set or ariy device with a browser to connect to the server 104 and use the messaging platforms made available by the server 104 assuring the coitinninication between the clients 114 and the IM server 106.
Message history can be stored by most IM clients on a local cotnputer. For alteniative web and mobile-based clients local storage may riot be possible. In a non-limiting embodiment, the server 104, may have the capability to storc message histor,v from IM
cotivei-sations done via one oi- more of the clients 114. The message history can be ace.essed and searched at any time via the server 104 by one or more of the clients 114 FIG. 2 depicts an example of a system 200 for displaying content from an IM
client at an alternative IM client. In the exainple of PIG. 2, the system 200 includes a client 202, an IM
network 204, a set-ver 206, an IM network 208, a client 210, other IM networks 212-1 to 212-N
(referred to collectively as other IM networks 212), and other clients 214-1 to 214-N (referred to collectively as other clients 214).
For illustrative purposes, it is assumed that the client 202 has content that is conipatible with the IM network 204. However, the client 210 is capable of reading content fotmatted to be compatible with the IM network 208. Thus, in operation, the server 206 collects content froni the client 202 (either through the IM network 204, as shown in FIG. 2, or directly from the client 202, such as is shown by way of exaniple in FIG. 1). The server 206 then forrnats the content as appropriate for use on the IM network 208. Once the content is properly formatted, it can be made available to the client 210 (either through the IM network 208, as sliown in FIG. 2, or directly to the client 210, such as is shown by way of example in FIG. I).
Depending upon the embodiment and/or implementation, the content may also be foi-matted as appropriate for one or more of the other IM networks 212, ta be made available for one or more of the other clients 214, In an embodiment, the server 206 can save the content in one or nlany formats.
Tn this way, ttie client 202 could make content available in a first IM fomiat, the server 206 could convert the content into a second IM fonnat, and the server 206 can save the content in at least the second TM fol-niat. Thus, the client 210 could receive the data in the seconcl IM fonnat. 'The server 206 could easily store the content in the first IM lori7iat, as well, and make the content, available to other clients coupled to the IM network 204. In addition, the server 206 could convert the content to other IM formats, such as those fonnats that are associatecl witli the otlier lM networks 212, and save the other IM fot-niats. In this way, the other clients 214 may have access to the content.
Message history can be stored by most IM clients on a local cotnputer. For alteniative web and mobile-based clients local storage may riot be possible. In a non-limiting embodiment, the server 104, may have the capability to storc message histor,v from IM
cotivei-sations done via one oi- more of the clients 114. The message history can be ace.essed and searched at any time via the server 104 by one or more of the clients 114 FIG. 2 depicts an example of a system 200 for displaying content from an IM
client at an alternative IM client. In the exainple of PIG. 2, the system 200 includes a client 202, an IM
network 204, a set-ver 206, an IM network 208, a client 210, other IM networks 212-1 to 212-N
(referred to collectively as other IM networks 212), and other clients 214-1 to 214-N (referred to collectively as other clients 214).
For illustrative purposes, it is assumed that the client 202 has content that is conipatible with the IM network 204. However, the client 210 is capable of reading content fotmatted to be compatible with the IM network 208. Thus, in operation, the server 206 collects content froni the client 202 (either through the IM network 204, as shown in FIG. 2, or directly from the client 202, such as is shown by way of exaniple in FIG. 1). The server 206 then forrnats the content as appropriate for use on the IM network 208. Once the content is properly formatted, it can be made available to the client 210 (either through the IM network 208, as sliown in FIG. 2, or directly to the client 210, such as is shown by way of example in FIG. I).
Depending upon the embodiment and/or implementation, the content may also be foi-matted as appropriate for one or more of the other IM networks 212, ta be made available for one or more of the other clients 214, In an embodiment, the server 206 can save the content in one or nlany formats.
Tn this way, ttie client 202 could make content available in a first IM fomiat, the server 206 could convert the content into a second IM fonnat, and the server 206 can save the content in at least the second TM fol-niat. Thus, the client 210 could receive the data in the seconcl IM fonnat. 'The server 206 could easily store the content in the first IM lori7iat, as well, and make the content, available to other clients coupled to the IM network 204. In addition, the server 206 could convert the content to other IM formats, such as those fonnats that are associatecl witli the otlier lM networks 212, and save the other IM fot-niats. In this way, the other clients 214 may have access to the content.
6 63017-8005. WO01 In a non-limiting enlbodiment, the client 202 may be able to view the client 2t0 and the c:lients 214 siniultancously. This is advantageous because IM clients typically cannot view IM
clients froni other 1M networks. AdvantaKeously, since the server 206 is used, the client 202 cuulcl evc;n include, for cxample, a mobile dL!vicu ~~,ithout a clicnt. (Of course. this coul(i he interpreted to mean that the client 202 is nut an IM client at all, thougii the term client is still used for illustrative purposes because the client 202 is sei-ved by the set-ver 206 in a client-server-like fashioti.) In a non-limiting embodiment, if the client 202 does not or cannot install client software, the client 202 can use a browser for web-based messaging and display.
FIG. 3 depicts an exaniple of a system 300 capable of contact aggregation .and display.
The systeiit 300 includes low level networks 302-I to 302-N (collectively refer-red to as t.he low level networks 302), a computer 304, and a display 306. The low level networks 302 may include, by way of example but not limitation, various IM networks. I.t may be noted that the computer 304 and the display 306 may be referred to, in certain implementations, as comprising a computer systenz.
The coniputer 304 includes a network interface 308, network login en;ines 310-I to 310-N (collectively referred to as network login engines 310), network contacts databases 312-1 to 312-N (collectively referred to as the network contacts database 312), a high level contacts database 314, a user profile database 316, and a contact aggregation engine 318.
The network interface 308 is coupled to the low level networks 302. In a typical implementation, the network interface 308 also couples the computer 304 to a network such as the Internet and/or a high level network (not shown).
The network login engines 310 may include logic and storage that facilitates login to the various low level networks 302. For example, the network login engine 310-1 may include a user name (and perhaps a password, if the password is not requested from the user at each login) associated with the low level network 302-1. Conceptually, each of the network login engines 310 is intended to represent the capability of login to the low level networks 302 in a general sense (i.e., the data and logic required for any device to connect to the low level networks 302) and a uscr-specific sense (e.g., the data provided frorri a user that enables login to accounts associated with the user).
The network contacts database 312, which is embodied in a computer-readable rnedium, includes contacts data associated with any of the networks into which a user has logged. When a user logs out, the data may oi- may not be cached (or stored in non-volatiie mernory) for future reference, depending upon the implementation and!or user configuration.
clients froni other 1M networks. AdvantaKeously, since the server 206 is used, the client 202 cuulcl evc;n include, for cxample, a mobile dL!vicu ~~,ithout a clicnt. (Of course. this coul(i he interpreted to mean that the client 202 is nut an IM client at all, thougii the term client is still used for illustrative purposes because the client 202 is sei-ved by the set-ver 206 in a client-server-like fashioti.) In a non-limiting embodiment, if the client 202 does not or cannot install client software, the client 202 can use a browser for web-based messaging and display.
FIG. 3 depicts an exaniple of a system 300 capable of contact aggregation .and display.
The systeiit 300 includes low level networks 302-I to 302-N (collectively refer-red to as t.he low level networks 302), a computer 304, and a display 306. The low level networks 302 may include, by way of example but not limitation, various IM networks. I.t may be noted that the computer 304 and the display 306 may be referred to, in certain implementations, as comprising a computer systenz.
The coniputer 304 includes a network interface 308, network login en;ines 310-I to 310-N (collectively referred to as network login engines 310), network contacts databases 312-1 to 312-N (collectively referred to as the network contacts database 312), a high level contacts database 314, a user profile database 316, and a contact aggregation engine 318.
The network interface 308 is coupled to the low level networks 302. In a typical implementation, the network interface 308 also couples the computer 304 to a network such as the Internet and/or a high level network (not shown).
The network login engines 310 may include logic and storage that facilitates login to the various low level networks 302. For example, the network login engine 310-1 may include a user name (and perhaps a password, if the password is not requested from the user at each login) associated with the low level network 302-1. Conceptually, each of the network login engines 310 is intended to represent the capability of login to the low level networks 302 in a general sense (i.e., the data and logic required for any device to connect to the low level networks 302) and a uscr-specific sense (e.g., the data provided frorri a user that enables login to accounts associated with the user).
The network contacts database 312, which is embodied in a computer-readable rnedium, includes contacts data associated with any of the networks into which a user has logged. When a user logs out, the data may oi- may not be cached (or stored in non-volatiie mernory) for future reference, depending upon the implementation and!or user configuration.
7 91004-00131LE GAL 1 2877050.1 63017 8005. W001 The higli level contacts database 414, which is embodied in a computer-readable medium, is an optional database that includes contacts associated with a high level network.
The liigh level contacts database is optional for at least two reasons. -I'he first reason is that a systcni need not provide thc ability to maintain high levcl contacts, requirin,11 lhat a user mainlairl only low level coritacts. The second reason is that even if the system provides the ability to maintain high level eontacts, a user niay opt not to maintain any higlt Icvcl contacts, opting uistead for low level contacts.
T'he user profile clatabase 416, which is embodied in a computer-readable medium, is intended to represent data associated with a user. The amount of data maintained is implenientation-speci fic.
The contact aggregation engine 418 is coupled to the databases 412, 414, 416, the network login engines 410, and the display 406. In operation, the contact aggregation engine 418 controls the network login engines 410 to login to or facilitate login by a user to the various low level networks 402. The databases 412, 414, 416 are accessed in such a way that a list of contacts stored in the netvvork contacts database 412 is aggregated and displayed on the display 406, as illustrated by the screenshots of FIGS. 4A-413, and the flowcharts of FIGS. 5-6.
FIGS. 4A-4I3 ciepiet exanrples of screenshots that clepicts a multi-network IM
display.
In many cases, a user will login to a high level account and adjust user configurations such that the system will autoniatically login the user to various low level accounts.
This may require storing login credentials so that the system can automatically login the user to each selected interface. FIG. 4A depicts an example of a screenshot 400A for a full screen display. In the example of FIG. 4A, the screenshot 400A includes a contacts list tab 402, an "add a network"
hyperlink 404, a plurality of MSN icons 406, a plurality of Yalioo! icons 408, and a plurality of AIM icons 410.
As the name implies, the contacts list tab 402 includes a listin.g of designated IM. client contacts. For an IM clicnt to be included in the listing, a user associated with ttie contact list typically must explicitly enter a client into the list. This may be accomplished with a single click. For exaniple, when a new IM client contacts the user, the user may be prompted to allow the IM. client to be enta-cd intc.i the user's contacts list.
As is suggested by the foldei-s depicted in the contacts list tab 402, a user may organize contacts in various folders. A single contact may be listed in no folders, one folder, or multiple folders, depending upon implementation and user confi gurations. Depending upon the implementation details, all contacts who are not currently online are listed in the "Offline" folder.
The liigh level contacts database is optional for at least two reasons. -I'he first reason is that a systcni need not provide thc ability to maintain high levcl contacts, requirin,11 lhat a user mainlairl only low level coritacts. The second reason is that even if the system provides the ability to maintain high level eontacts, a user niay opt not to maintain any higlt Icvcl contacts, opting uistead for low level contacts.
T'he user profile clatabase 416, which is embodied in a computer-readable medium, is intended to represent data associated with a user. The amount of data maintained is implenientation-speci fic.
The contact aggregation engine 418 is coupled to the databases 412, 414, 416, the network login engines 410, and the display 406. In operation, the contact aggregation engine 418 controls the network login engines 410 to login to or facilitate login by a user to the various low level networks 402. The databases 412, 414, 416 are accessed in such a way that a list of contacts stored in the netvvork contacts database 412 is aggregated and displayed on the display 406, as illustrated by the screenshots of FIGS. 4A-413, and the flowcharts of FIGS. 5-6.
FIGS. 4A-4I3 ciepiet exanrples of screenshots that clepicts a multi-network IM
display.
In many cases, a user will login to a high level account and adjust user configurations such that the system will autoniatically login the user to various low level accounts.
This may require storing login credentials so that the system can automatically login the user to each selected interface. FIG. 4A depicts an example of a screenshot 400A for a full screen display. In the example of FIG. 4A, the screenshot 400A includes a contacts list tab 402, an "add a network"
hyperlink 404, a plurality of MSN icons 406, a plurality of Yalioo! icons 408, and a plurality of AIM icons 410.
As the name implies, the contacts list tab 402 includes a listin.g of designated IM. client contacts. For an IM clicnt to be included in the listing, a user associated with ttie contact list typically must explicitly enter a client into the list. This may be accomplished with a single click. For exaniple, when a new IM client contacts the user, the user may be prompted to allow the IM. client to be enta-cd intc.i the user's contacts list.
As is suggested by the foldei-s depicted in the contacts list tab 402, a user may organize contacts in various folders. A single contact may be listed in no folders, one folder, or multiple folders, depending upon implementation and user confi gurations. Depending upon the implementation details, all contacts who are not currently online are listed in the "Offline" folder.
8 91004-0013/LE GAL 12877050.1 63017-8005. W(701 "1'he "ad<i a network" hyperlink 304 can be followed to add networks for display. In a non-tirniting embodiment, when a network is added. contacts of the user in the added netxuork are added to the contacts list tab 402. The added contacts are distinguishable by network using, for example, the icons 406, 408, 410.
In an alicmative embodiment, the contact list cottlci be maintained in a high level network (i.e., all ccmtacts are listed in the contact list, even if the contacts are from a network that has not been added). If a contact is a melnbet= of a network that is not added, the contact would presutnably be listed in the "Offline" folder because the contact is not known to the user to be online. However, depending upon the implenientation, the "Offline"
folder could be effectively split into two folders, if desired, one which indicates a contact is offfine, and one that indicates a contact is a member of a network that ltas not been added. In the example of FIG.
4A, this is implicit because the added networks have icon 406, 408, 410 associated with them, and each ofthe contacts have icons 406, 408, 410 associated with them. So, it is apparent from viewing the display whether a contact is or is not a member of a network that is currently added.
In a non-limiting embodiment, adding a network requires that the user be a member of the added network. For example, if the user wistles to add the MSN IM network, the user must have an IM account with MSN. However, in an alternative embodiment, a system could set up a dununy account for a user who wishes to add an account for a network with which the user is not a tnetnbcr. The dtun.my accotrnt will be associated with the user, but the user might feel tnore conlfortable with not ever logging in, remembering a password, etc. The system could handle all of these details for che user without the user's knowledge, and with.out exposing the user to security risks suct- as compromised passwords (since some users use the same password for multiple accounts, but in this case the system would generate a randoni, and presunlably strong, password for use witlt the accottnt).
FIG. 4B depicts an exatnple of a screenshot 400B fbr a mobile phone display.
In the example of FIG. 4B, the contact list includes a series of contacts and their associated network-identifyin; icons 406, 408, 410. The infot-tnation available on a niobile phone display is less than that of a full screen display, such as is available on, for example, a laptop display.
In the example of FIG. 4B, a user can add accounts by clieking on an "add account"
hyperlink 412. Depending upon the implementation, clicking on the "add account" hyperlink 412 could prompt the user to select an account from a list of accounts the user lias ah=eady designated in a contacts list (or add a new account), to select a list of accounts associated with a particular subset (see, e.g., the folders of FIG. 4A), to select a particular network (which may ine.htde logging the user in to the network or prompting the user to do so), storing log.in
In an alicmative embodiment, the contact list cottlci be maintained in a high level network (i.e., all ccmtacts are listed in the contact list, even if the contacts are from a network that has not been added). If a contact is a melnbet= of a network that is not added, the contact would presutnably be listed in the "Offline" folder because the contact is not known to the user to be online. However, depending upon the implenientation, the "Offline"
folder could be effectively split into two folders, if desired, one which indicates a contact is offfine, and one that indicates a contact is a member of a network that ltas not been added. In the example of FIG.
4A, this is implicit because the added networks have icon 406, 408, 410 associated with them, and each ofthe contacts have icons 406, 408, 410 associated with them. So, it is apparent from viewing the display whether a contact is or is not a member of a network that is currently added.
In a non-limiting embodiment, adding a network requires that the user be a member of the added network. For example, if the user wistles to add the MSN IM network, the user must have an IM account with MSN. However, in an alternative embodiment, a system could set up a dununy account for a user who wishes to add an account for a network with which the user is not a tnetnbcr. The dtun.my accotrnt will be associated with the user, but the user might feel tnore conlfortable with not ever logging in, remembering a password, etc. The system could handle all of these details for che user without the user's knowledge, and with.out exposing the user to security risks suct- as compromised passwords (since some users use the same password for multiple accounts, but in this case the system would generate a randoni, and presunlably strong, password for use witlt the accottnt).
FIG. 4B depicts an exatnple of a screenshot 400B fbr a mobile phone display.
In the example of FIG. 4B, the contact list includes a series of contacts and their associated network-identifyin; icons 406, 408, 410. The infot-tnation available on a niobile phone display is less than that of a full screen display, such as is available on, for example, a laptop display.
In the example of FIG. 4B, a user can add accounts by clieking on an "add account"
hyperlink 412. Depending upon the implementation, clicking on the "add account" hyperlink 412 could prompt the user to select an account from a list of accounts the user lias ah=eady designated in a contacts list (or add a new account), to select a list of accounts associated with a particular subset (see, e.g., the folders of FIG. 4A), to select a particular network (which may ine.htde logging the user in to the network or prompting the user to do so), storing log.in
9 9 1 004-00 1 31LEGAL 1287?050 1 63017-8005. WOa 1 credentials and, when logging in, the system can automatically login the user to each selected inti:ri~aWe, or to select accounts in sottZe othcr manner. I'rUõun,_ibiy, iCan accouut is selected for a contact that is a rnentber o1'a network in which thc user has ttot logged in, in a non-limiting embodimeni, either the user or the system will have to louin to the network.
In the example of FIG. 413, the user can remove accounts from the online list by clicking on a"signout" hyperlink 414 next to the accounts. Depending on the imptementatiott, clicking on the "siguout" hyperlink 414 may cause the ttset- to go offline with respect to the account associated with the particular "signout" hyperlinl<, or with all accounts on the same uetwork as the account associated with the particular "signout" hyperlink.
A"sigiout" hyperlink 416 may be used to sign out of all networks at once or, in a different implenientation, cause the user to be prompted regarding the networks from wliich to sign out.
In the exainple of FIG. 4B, the screenshot 400B includes a "reload" hyperlink 418_ It may be desirable to occasionally refresh the screen. Sotne mobile devices may even be incapable of refreshing without an explicit reload.
FIG. 5 depicts a flowchart 500 of' an example oi'a method for contact list aggregation and display. This method and other methods are clepicted as serially arranged rnodules.
However, tnodules of the methods may be reordered, or arranged for parallel execution as appropriate. In the example of FIG. 5, the flowchart 500 begins at module 502 where a high level network is joined. A high level network may inciude, by way of exaniple but not limitation, eBuddy.
In the example of FIG. 5, the flowchart 500 continues to module 504 where a low level network is joined. Low level networks may include IM networks, such as MSN
Messenger, Yalioo! Instant Messenger, AIM, or any otlier known or convenient network. It should also work properly if high level networks were joined as if the high level networks were low level.
For example, a member of a first high level network could join a second high level network, which in turn is associated with first and second low level networks. The second high level netwot-k would ittnction rather like a nocle in a tree, where the first liigh level nethvork is the root, and the leaves of ttie node ai-e the first and second low level rteriworks.
Thus, the second high level netwot-k could be thought of as a mid-level network. lJnless a distinction is needed, mid-level networks are treated as low level networks herein.
In the example of FIG. 5, the flowchart 500 continues to decision point 506 where it is determined whether to join more low level networks. If it is detennined that more low level networks are to bejoinetl (506-Y), then the flowchart 500 loops back to module 50=1, as 91004-0013/LEGAL 12877050.1 Av- Oftl.
described previously. il; on the other hand, it is detcrnlined that no more low level networks are to be joined (506-N), then the flowchart 500 cantinues to module 508 where a contact list associated with one or more of the low level nehvoi-ks is maintained.
While contact lists are not particularly inlpeu=tant in email environments (beeause you can write an email to anyone whose email address you know), in IM
environnients, contact lists are more desirable because users want to see wlio is online before sending an IM. If a contact is not ortline, IM is not allowed in many implenlcntations (and in an implementation that "allor.i-s"
1M with an offline contact, the communication is arguably not an instant message). Accordingly, at least in an IM environment, most users will maintain a contact list (508).
In the example of FIG. 5, the flowchatK 500 continues to module 51 tl where the high level networks is logged into. When a user logs into a high level network, the user will typically have a number of options, including requesting that a list of contacts be displayed. The list of contacts could also be displayed autotnatically upot- login, depending upon the irnpletuentation and user con figtu-ations.
In the exarnple of FIG. 5, the flowchart 500 continues to modute 512 where contacts from each of the low level networks are displayed in an aggregated contact list. Depending upon the implementation or user eonftguration, the contaet list could include high level contacts, too.
Also depending upon the implementation and/or user configuration, the user may or may not be required to login to each of the low level networks for which contacts are to be displayed in the aggregated contact list.
In the example of FIG. 5, the flowchart 500 contuiues to decision point 514 where it is detemZined whether to quit the high level network. If the user does not quit the high level network (514-N), then the tlowchart 500 continues to decision point 516 where it is determined whether the user logs out of the high level network. If it is deteimined that the user is to logaut of the high level network (516-Y), then the flowchart 500 continues to module 518 where the user logs out. Whetlier the user logs out (516-t', 518), ur not (516-N), the flowchart 500 loops back to decision point 506, as described previouslv.
In many cases, a user may never quit the high level network, however it is theoretically possible that a user would quit (or a user would be banneci ). If the user quits or is banned from the high level network (514-Y), then the flowchart 500 ends.
FIG. 6 depicts a flowchart 600 of an example of a mettlod for ag;rregated contact list di.splay. In the example of FiG. 6, the flowchart 600 starts at module 602 where a metnber logs into a high level networl..
91004-0013/LE GAL12877050.1 AW, 63017-8005. W00 i In the example of FIG. 6, the flowchart 600 continues to module 604 where a user logs into a low level network through the liigh level network. Depending upon the implenientation and/or user configurations, the user niay be logged into the low level network automatically whcn logging inlo the high luvcl nctwork, explieit(y by the usea-, or thc use r may be logged into the low level network whcn thc user selects a contae.t that is associated with the low level netwurk.
In the example of FIG. 6, the flowchart 600 continues to module 606 where high level and low level contacts are displayed in an aggregated contact list. It may be noted that a user may not have a high level contact list, either because a high level systeni does not allow for contact lists, or because the user does not opt to maintain any contact lists at the high level.
In the example of FIG. 6, tJie tlowchart 600 continues to decision point 608 where it is detenn.ined whether to logout of the low level network. If it is determined to logout of tbe low level network (608-Y), then the flowchart 600 continues to module 610 where the relevant low level contacts are removed from the aggregated display, and the flowchart 600 loops back to module 606, as described previously. The relevaazt low level contacts are those contacts that are in ttie contact list associated with the low level network from which logout was elected. If, on the other hand, it is detertnined not to logout of the low level network (608-N), then the flowchart 600 continues to decision point 612.
In the example of FIG. 6, the flowchart 600 continues to decision point 612 where it is determ.ined whether to login to a low level network. It is possible to login to an implenlentation-specific number of low level networks (or, in the alternative, practically any nunlber of low level networks). If it is determined to login to a low level network (612-Y), then the flowchart 600 loops back to module 604, as ciescribed previously. If, on the other hand, it is determined not to login to a low level network (612-N), then the flowchart 600 continues to decision point 614, where it is detemiined whetlier to logout of the high level network. If not (614-N), the flowchart 600 loops back to niodule 606, as described previously. If so (614-Y), then the flowchart 600 ends.
FIG. 7 depicts a computer system 700 suitable for implementation of the techniques described above with reference to FIGS. 1-6. The computer system 700 includes a computer 702, 110 devices 704, and a display device 706. The computer 702 incl-,ides a processor 708, a conimunications interG;ice 71(), merr-ory 712, display controller 7 t4, non-volatile stora~e ? 10, and I/O controller 718. The computer 702 may be coupled to or include the I/O
devices 704 and display device 706.
9 t 004-0013/LEGAL12877050.1 AMk The computer 702 interfaces to external systems thi-ough the communications interface 7( 0, which may inclucle a rnodem or network interface. The conimunications interface 710 can be considered to be part of the computer systeni 700 or a part ofthe computer 702. Thc cummunications intc:rlacc 710 can be an analog rnodem, ISDN ntoctem, cabic i'viodem, token ring interface, satellite transniission interface (e.g. "ilireet PC"), or other inleri'aces lor coupling a computer system to other computer systenis. Although conventional cotnputers typically include a communications interface of sonie type, it is possible to create a computer that does not inclttde one, thereby making the communicatiotis interface 710 optional in the strictest sense of the word.
The processor 708 may include, by way of exain.ple but tlot limitation, a conventional microprocessor sucli as an Intel Pentium microprocessor or Motorola power PC.:
microprocessor.
Whiie the processot- 708 is a critical coinponent of all conventional computers, any applicable known or conveniertt processor could be used for the purposcs of implementing the techniques described herein. The memory 712 is coupled to the processor 708 by a bus 720.
The memory 712, which mav be referred to as "primary memory," can include Dynamic Random Access Memory (DRAM) and can also include Static RAM (SRAM). The bus 720 couples the processor 708 to the memory 712, and also to the non-volatile storage 716, to the display controller 714, and to the UO controller 718.
The I/O devices 704 can include a keyboard, disk drives, printers, a scaiiner, and other input and output devices, including a mouse or other pointing device. For illustrative purposes, at least one of the UO devices is assumed to be a block-based media device, such as a DVD
player. The display controller 714 may control, in a known or convenient maiiner, a display on the display device 706, which can be, for example, a cathode ray tube (CRT) or liquid crystal display (LCD).
The display controller 714 and I/O controller 718 may include device drivers.
A device driver is a specific type of computer software developed to allow interaction with liardware devices. Typically this constitutes an interface for comniunicating with the device, through a bus or communications subsystem that the hardwarc is connected to, providing commands to and/or receiving data fi-om the dcvice, anci on the otlier end, the requisite interfaces to the OS and software applications.
I'he device driver mav include a hardware-depcndent coinputei- pro~~ram that is also OS-specific. The computer program etiables another program, typically an OS or applications software package or computer program running under the OS kernel, to interact transparently with a hardware device, and usually provides the requisite interrupt liandling necessary for any necessary asynchronous time-dependent hardware interfacing needs.
Or,-63617-8005. WOD 1 Thc non-volatile storage 716, wltich may be t'el'crrcci to as "secondary memory," is otten a magnetic hard disk, an optical disk, or anothcr form of storage for large atnounts of data. Sorne of this data is offten written, by a direct memory access process, into memory 712 during execution of so[lware in the comintter 702. The non-volatile storage 716 tilay include a block-based niedia device. The terms "machine-readable mediurn" or "computer-readable medium"
include any lcnown or convenient storage device that is accessible by the processor 608 and also encompasses a carrier wave that cncodes a data signal.
The cotnputer system 700 is one example of many possible computer systems which have different architectures. For example, personal computers based on an Intel microprocessor olten have multiple buses, one of which can be an I/O bus for the peripherals and one that direclly connects the processor 708 and the memory 712 (often referred to as a memory bus).
The buses are connected together through bridge components tiiat perfotm any necessary translation due to diffcring bus protocols.
Network computers are anotl--er type of computer system that can be used in catijunction with the teachings provided herein. Network coniputers do not usually include a liard disk or other mass storage, and the executable prog.ranis are loaded from a network connection into the memory 712 for execution by the processor 708. A Web TV
system, which is known in the art, is also considered to be a computer systeni, but it may lack some of the features shown in FIG. 6, such as certain input or output devices. A typical coniputer system will usually include at least a processor, memory, and a bus coupling the meni.ory to the processor.
The cotnputer system 700 may be controlled by an operating systein (OS). An OS
is a software program-used on most, but not all, conlputer systems - that manages the hardware and software resottrces of a computer. Typically, the OS performs basic tasks such as controlling and allocating memory, prioritizing system requests, controlling input and output cievices, facilitating networking, and managing files. F?xamples of operating systems for personal computers include Microsoft Windows(Di,, Linux, and Mac OS- R.
Delincating between the OS and application software is sometimes rather difficult. Fortunately, delineation is not neccssary to understand the techaiques described herein, since anv reasonable delineation should su ffice.
The lowest level of an OS may be its kernel. The kern4l is typically the first layer of software loaded into meinory when a systeni boots or starts up. The kernel provides access to various common core services to otlier system and application programs.
9 t 004-0013ILEGAL12877050.1 63017-8005 WOOf As used herein, algorithmic descriptions and symbolic representations of operations cm data bits within a coniputer meniory are believed to most effectively convey the techniques to others skilled in the art. An algorithm is here. and generally, conceived to be a self-eonsistent sequence of operations leading to a desired result. 'hhe operations are those requiring physical manipulations of physical quantities. Usually, tltou,h not necessarily, these quantities take the form of electrical or magnetic signals capablc ol'bcira- stored, transferred, conibined, compared, anii otherwise manipulated. It ltas proven convenicnt at t'imes, principally for reasons of common usage, to rcfer to these signals as bits, values, elements, symbols, characters, terms, nwnbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as "processing"
or "computing" or "calculatin;" or "determining" or "displaying" or the like, refer to the action and processes of a computer that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such infomiation storage, transmission or display devices.
An apparatus for performing techniques describeci herein may be specially constructed for the required purposes, or it may coniprise a general ptrrpose computer selectively activated or reconfigured by a conlputer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, by way of example but not limitation, read-only memories (ROMs), RAMs, EPROMs, EEPROMs, magtietic or optical cards, any type of disk including floppy disks, optical disks, CD-ROMs, DVDs, and magnetic-optical disks, or any known or convenient type of media suitable for storinD electronic instructlons.
The algorithms and displays presented herein are not inherently related to any particular computer architecture. The tecliniques may be implemented using any known or convenient progr-anlming laaiguage, whether high level (e.g., C/C++) or low level (e.g., assembly language), and whether interpreted (e.g., .Pcrl), compiled (e.g., C/C++), or Just-rn-Time (JIT) compiled froni hytecode (e.g., .lava). Any known or convenient contputer, regardless of architecttire, should be capable ofexecuting machine cocle compiled or otherwise assembled ti-onl an-y language into rrrachine code that is conlpatible with the computer's architc;cturC.
As i.rSed herein, the term "embodinient" nieans an cmbodin-rent that serves to illustrate by wav of example but not limitation.
91004 -0013/L ECoAL 12877050.1 It will be appreciauc.tl to tliosc,l.illed irL the art that the preceding examples and crubodinlents are exemplary and not liniiling to the scope ot'the present invention. tt is inteilded that all permutations, enlianeemerits, equivalents, and itnprovements thereto that are apparent to those skilled in the art upon a reading of the specification and a study of the drawings are includecl within the true spirit and scope of the present invetltion. It is tllerefot-e intended that the folluwing appended claims include all such modifications, permutations and equivalents as fall within the true spirit and scope of thc present invention.
91 004-001 31LEGAL 12877050.1
In the example of FIG. 413, the user can remove accounts from the online list by clicking on a"signout" hyperlink 414 next to the accounts. Depending on the imptementatiott, clicking on the "siguout" hyperlink 414 may cause the ttset- to go offline with respect to the account associated with the particular "signout" hyperlinl<, or with all accounts on the same uetwork as the account associated with the particular "signout" hyperlink.
A"sigiout" hyperlink 416 may be used to sign out of all networks at once or, in a different implenientation, cause the user to be prompted regarding the networks from wliich to sign out.
In the exainple of FIG. 4B, the screenshot 400B includes a "reload" hyperlink 418_ It may be desirable to occasionally refresh the screen. Sotne mobile devices may even be incapable of refreshing without an explicit reload.
FIG. 5 depicts a flowchart 500 of' an example oi'a method for contact list aggregation and display. This method and other methods are clepicted as serially arranged rnodules.
However, tnodules of the methods may be reordered, or arranged for parallel execution as appropriate. In the example of FIG. 5, the flowchart 500 begins at module 502 where a high level network is joined. A high level network may inciude, by way of exaniple but not limitation, eBuddy.
In the example of FIG. 5, the flowchart 500 continues to module 504 where a low level network is joined. Low level networks may include IM networks, such as MSN
Messenger, Yalioo! Instant Messenger, AIM, or any otlier known or convenient network. It should also work properly if high level networks were joined as if the high level networks were low level.
For example, a member of a first high level network could join a second high level network, which in turn is associated with first and second low level networks. The second high level netwot-k would ittnction rather like a nocle in a tree, where the first liigh level nethvork is the root, and the leaves of ttie node ai-e the first and second low level rteriworks.
Thus, the second high level netwot-k could be thought of as a mid-level network. lJnless a distinction is needed, mid-level networks are treated as low level networks herein.
In the example of FIG. 5, the flowchart 500 continues to decision point 506 where it is determined whether to join more low level networks. If it is detennined that more low level networks are to bejoinetl (506-Y), then the flowchart 500 loops back to module 50=1, as 91004-0013/LEGAL 12877050.1 Av- Oftl.
described previously. il; on the other hand, it is detcrnlined that no more low level networks are to be joined (506-N), then the flowchart 500 cantinues to module 508 where a contact list associated with one or more of the low level nehvoi-ks is maintained.
While contact lists are not particularly inlpeu=tant in email environments (beeause you can write an email to anyone whose email address you know), in IM
environnients, contact lists are more desirable because users want to see wlio is online before sending an IM. If a contact is not ortline, IM is not allowed in many implenlcntations (and in an implementation that "allor.i-s"
1M with an offline contact, the communication is arguably not an instant message). Accordingly, at least in an IM environment, most users will maintain a contact list (508).
In the example of FIG. 5, the flowchatK 500 continues to module 51 tl where the high level networks is logged into. When a user logs into a high level network, the user will typically have a number of options, including requesting that a list of contacts be displayed. The list of contacts could also be displayed autotnatically upot- login, depending upon the irnpletuentation and user con figtu-ations.
In the exarnple of FIG. 5, the flowchart 500 continues to modute 512 where contacts from each of the low level networks are displayed in an aggregated contact list. Depending upon the implementation or user eonftguration, the contaet list could include high level contacts, too.
Also depending upon the implementation and/or user configuration, the user may or may not be required to login to each of the low level networks for which contacts are to be displayed in the aggregated contact list.
In the example of FIG. 5, the flowchart 500 contuiues to decision point 514 where it is detemZined whether to quit the high level network. If the user does not quit the high level network (514-N), then the tlowchart 500 continues to decision point 516 where it is determined whether the user logs out of the high level network. If it is deteimined that the user is to logaut of the high level network (516-Y), then the flowchart 500 continues to module 518 where the user logs out. Whetlier the user logs out (516-t', 518), ur not (516-N), the flowchart 500 loops back to decision point 506, as described previouslv.
In many cases, a user may never quit the high level network, however it is theoretically possible that a user would quit (or a user would be banneci ). If the user quits or is banned from the high level network (514-Y), then the flowchart 500 ends.
FIG. 6 depicts a flowchart 600 of an example of a mettlod for ag;rregated contact list di.splay. In the example of FiG. 6, the flowchart 600 starts at module 602 where a metnber logs into a high level networl..
91004-0013/LE GAL12877050.1 AW, 63017-8005. W00 i In the example of FIG. 6, the flowchart 600 continues to module 604 where a user logs into a low level network through the liigh level network. Depending upon the implenientation and/or user configurations, the user niay be logged into the low level network automatically whcn logging inlo the high luvcl nctwork, explieit(y by the usea-, or thc use r may be logged into the low level network whcn thc user selects a contae.t that is associated with the low level netwurk.
In the example of FIG. 6, the flowchart 600 continues to module 606 where high level and low level contacts are displayed in an aggregated contact list. It may be noted that a user may not have a high level contact list, either because a high level systeni does not allow for contact lists, or because the user does not opt to maintain any contact lists at the high level.
In the example of FIG. 6, tJie tlowchart 600 continues to decision point 608 where it is detenn.ined whether to logout of the low level network. If it is determined to logout of tbe low level network (608-Y), then the flowchart 600 continues to module 610 where the relevant low level contacts are removed from the aggregated display, and the flowchart 600 loops back to module 606, as described previously. The relevaazt low level contacts are those contacts that are in ttie contact list associated with the low level network from which logout was elected. If, on the other hand, it is detertnined not to logout of the low level network (608-N), then the flowchart 600 continues to decision point 612.
In the example of FIG. 6, the flowchart 600 continues to decision point 612 where it is determ.ined whether to login to a low level network. It is possible to login to an implenlentation-specific number of low level networks (or, in the alternative, practically any nunlber of low level networks). If it is determined to login to a low level network (612-Y), then the flowchart 600 loops back to module 604, as ciescribed previously. If, on the other hand, it is determined not to login to a low level network (612-N), then the flowchart 600 continues to decision point 614, where it is detemiined whetlier to logout of the high level network. If not (614-N), the flowchart 600 loops back to niodule 606, as described previously. If so (614-Y), then the flowchart 600 ends.
FIG. 7 depicts a computer system 700 suitable for implementation of the techniques described above with reference to FIGS. 1-6. The computer system 700 includes a computer 702, 110 devices 704, and a display device 706. The computer 702 incl-,ides a processor 708, a conimunications interG;ice 71(), merr-ory 712, display controller 7 t4, non-volatile stora~e ? 10, and I/O controller 718. The computer 702 may be coupled to or include the I/O
devices 704 and display device 706.
9 t 004-0013/LEGAL12877050.1 AMk The computer 702 interfaces to external systems thi-ough the communications interface 7( 0, which may inclucle a rnodem or network interface. The conimunications interface 710 can be considered to be part of the computer systeni 700 or a part ofthe computer 702. Thc cummunications intc:rlacc 710 can be an analog rnodem, ISDN ntoctem, cabic i'viodem, token ring interface, satellite transniission interface (e.g. "ilireet PC"), or other inleri'aces lor coupling a computer system to other computer systenis. Although conventional cotnputers typically include a communications interface of sonie type, it is possible to create a computer that does not inclttde one, thereby making the communicatiotis interface 710 optional in the strictest sense of the word.
The processor 708 may include, by way of exain.ple but tlot limitation, a conventional microprocessor sucli as an Intel Pentium microprocessor or Motorola power PC.:
microprocessor.
Whiie the processot- 708 is a critical coinponent of all conventional computers, any applicable known or conveniertt processor could be used for the purposcs of implementing the techniques described herein. The memory 712 is coupled to the processor 708 by a bus 720.
The memory 712, which mav be referred to as "primary memory," can include Dynamic Random Access Memory (DRAM) and can also include Static RAM (SRAM). The bus 720 couples the processor 708 to the memory 712, and also to the non-volatile storage 716, to the display controller 714, and to the UO controller 718.
The I/O devices 704 can include a keyboard, disk drives, printers, a scaiiner, and other input and output devices, including a mouse or other pointing device. For illustrative purposes, at least one of the UO devices is assumed to be a block-based media device, such as a DVD
player. The display controller 714 may control, in a known or convenient maiiner, a display on the display device 706, which can be, for example, a cathode ray tube (CRT) or liquid crystal display (LCD).
The display controller 714 and I/O controller 718 may include device drivers.
A device driver is a specific type of computer software developed to allow interaction with liardware devices. Typically this constitutes an interface for comniunicating with the device, through a bus or communications subsystem that the hardwarc is connected to, providing commands to and/or receiving data fi-om the dcvice, anci on the otlier end, the requisite interfaces to the OS and software applications.
I'he device driver mav include a hardware-depcndent coinputei- pro~~ram that is also OS-specific. The computer program etiables another program, typically an OS or applications software package or computer program running under the OS kernel, to interact transparently with a hardware device, and usually provides the requisite interrupt liandling necessary for any necessary asynchronous time-dependent hardware interfacing needs.
Or,-63617-8005. WOD 1 Thc non-volatile storage 716, wltich may be t'el'crrcci to as "secondary memory," is otten a magnetic hard disk, an optical disk, or anothcr form of storage for large atnounts of data. Sorne of this data is offten written, by a direct memory access process, into memory 712 during execution of so[lware in the comintter 702. The non-volatile storage 716 tilay include a block-based niedia device. The terms "machine-readable mediurn" or "computer-readable medium"
include any lcnown or convenient storage device that is accessible by the processor 608 and also encompasses a carrier wave that cncodes a data signal.
The cotnputer system 700 is one example of many possible computer systems which have different architectures. For example, personal computers based on an Intel microprocessor olten have multiple buses, one of which can be an I/O bus for the peripherals and one that direclly connects the processor 708 and the memory 712 (often referred to as a memory bus).
The buses are connected together through bridge components tiiat perfotm any necessary translation due to diffcring bus protocols.
Network computers are anotl--er type of computer system that can be used in catijunction with the teachings provided herein. Network coniputers do not usually include a liard disk or other mass storage, and the executable prog.ranis are loaded from a network connection into the memory 712 for execution by the processor 708. A Web TV
system, which is known in the art, is also considered to be a computer systeni, but it may lack some of the features shown in FIG. 6, such as certain input or output devices. A typical coniputer system will usually include at least a processor, memory, and a bus coupling the meni.ory to the processor.
The cotnputer system 700 may be controlled by an operating systein (OS). An OS
is a software program-used on most, but not all, conlputer systems - that manages the hardware and software resottrces of a computer. Typically, the OS performs basic tasks such as controlling and allocating memory, prioritizing system requests, controlling input and output cievices, facilitating networking, and managing files. F?xamples of operating systems for personal computers include Microsoft Windows(Di,, Linux, and Mac OS- R.
Delincating between the OS and application software is sometimes rather difficult. Fortunately, delineation is not neccssary to understand the techaiques described herein, since anv reasonable delineation should su ffice.
The lowest level of an OS may be its kernel. The kern4l is typically the first layer of software loaded into meinory when a systeni boots or starts up. The kernel provides access to various common core services to otlier system and application programs.
9 t 004-0013ILEGAL12877050.1 63017-8005 WOOf As used herein, algorithmic descriptions and symbolic representations of operations cm data bits within a coniputer meniory are believed to most effectively convey the techniques to others skilled in the art. An algorithm is here. and generally, conceived to be a self-eonsistent sequence of operations leading to a desired result. 'hhe operations are those requiring physical manipulations of physical quantities. Usually, tltou,h not necessarily, these quantities take the form of electrical or magnetic signals capablc ol'bcira- stored, transferred, conibined, compared, anii otherwise manipulated. It ltas proven convenicnt at t'imes, principally for reasons of common usage, to rcfer to these signals as bits, values, elements, symbols, characters, terms, nwnbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as "processing"
or "computing" or "calculatin;" or "determining" or "displaying" or the like, refer to the action and processes of a computer that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such infomiation storage, transmission or display devices.
An apparatus for performing techniques describeci herein may be specially constructed for the required purposes, or it may coniprise a general ptrrpose computer selectively activated or reconfigured by a conlputer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, by way of example but not limitation, read-only memories (ROMs), RAMs, EPROMs, EEPROMs, magtietic or optical cards, any type of disk including floppy disks, optical disks, CD-ROMs, DVDs, and magnetic-optical disks, or any known or convenient type of media suitable for storinD electronic instructlons.
The algorithms and displays presented herein are not inherently related to any particular computer architecture. The tecliniques may be implemented using any known or convenient progr-anlming laaiguage, whether high level (e.g., C/C++) or low level (e.g., assembly language), and whether interpreted (e.g., .Pcrl), compiled (e.g., C/C++), or Just-rn-Time (JIT) compiled froni hytecode (e.g., .lava). Any known or convenient contputer, regardless of architecttire, should be capable ofexecuting machine cocle compiled or otherwise assembled ti-onl an-y language into rrrachine code that is conlpatible with the computer's architc;cturC.
As i.rSed herein, the term "embodinient" nieans an cmbodin-rent that serves to illustrate by wav of example but not limitation.
91004 -0013/L ECoAL 12877050.1 It will be appreciauc.tl to tliosc,l.illed irL the art that the preceding examples and crubodinlents are exemplary and not liniiling to the scope ot'the present invention. tt is inteilded that all permutations, enlianeemerits, equivalents, and itnprovements thereto that are apparent to those skilled in the art upon a reading of the specification and a study of the drawings are includecl within the true spirit and scope of the present invetltion. It is tllerefot-e intended that the folluwing appended claims include all such modifications, permutations and equivalents as fall within the true spirit and scope of thc present invention.
91 004-001 31LEGAL 12877050.1
Claims (20)
1. A system comprising:
a network interface;
a network login engine coupled to the network interface;
a network contacts database embodied in one or more computer-readable mediums;
a web server coupled to the network contacts database;
a contact aggregation engine coupled to the network login engine and the network contacts database;
wherein, in operation, the contact aggregation engine controls the network login engine to login or facilitate login to one or more networks, updates in the networks contacts database contact information associated with the one or more networks, stores the aggregated contact list in a computer-readable medium at the web server, and provides an aggregated contact list including the contact information to a display device.
a network interface;
a network login engine coupled to the network interface;
a network contacts database embodied in one or more computer-readable mediums;
a web server coupled to the network contacts database;
a contact aggregation engine coupled to the network login engine and the network contacts database;
wherein, in operation, the contact aggregation engine controls the network login engine to login or facilitate login to one or more networks, updates in the networks contacts database contact information associated with the one or more networks, stores the aggregated contact list in a computer-readable medium at the web server, and provides an aggregated contact list including the contact information to a display device.
2. The system of claim 1 further comprising a high level contacts database embodied in a computer readable medium, wherein, in operation, contacts from the high level contacts database are included in the aggregated contact list.
3. The system of claim 1, wherein the network login engine includes a plurality of network login engines that include sufficient information to login or facilitate login to a respective plurality of low level networks.
4. The system of claim 1, further comprising a user profile database, embodied in a computer-readable medium and coupled to the network login engine, wherein, in operation, the user profile database includes a user-specific information that the network login engine uses to login or facilitate login to the one or more networks.
5. The system of claim 1, further comprising the display device.
6. The system of claim 1, further comprising the one or more networks.
7. A method comprising:
joining a high level network;
joining one or more low level networks;
maintaining a contact list associated with the one or more low level networks;
logging into the high level network;
displaying contacts from the one or more low level networks in an aggregated contact list.
joining a high level network;
joining one or more low level networks;
maintaining a contact list associated with the one or more low level networks;
logging into the high level network;
displaying contacts from the one or more low level networks in an aggregated contact list.
8. The method of claim 7, further comprising logging into the one or more low level networks.
9. The method of claim 7, further comprising:
maintaining a contact list associated with the high level network;
displaying contacts from the high level network in the aggregated contact list.
maintaining a contact list associated with the high level network;
displaying contacts from the high level network in the aggregated contact list.
10. The method of claim 7, further comprising joining an additional low level network, wherein the aggregated contact list does not include contacts of the additional low level network.
11. The method of claim 7, further comprising:
logging into the one or more low level networks and an additional low level network;
displaying contacts from the one or more low level networks and the additional low level network in the aggregated contact list;
logging out of the additional low level network.
logging into the one or more low level networks and an additional low level network;
displaying contacts from the one or more low level networks and the additional low level network in the aggregated contact list;
logging out of the additional low level network.
12. The method of claim 7, further comprising logging out of the high level network.
13. A method comprising:
logging into a high level network;
logging into a low level network;
displaying an aggregated contact list that includes contacts associated with the low level network through the high level network.
logging into a high level network;
logging into a low level network;
displaying an aggregated contact list that includes contacts associated with the low level network through the high level network.
11. The method of claim 13, further comprising automatically logging into the low level network in response to logging into the high level network.
15. The method of claim 13, further comprising facilitating an explicit login to the low level network.
16. The method of claim 13, wherein the logging into the low level network is in response to a user selecting a contact for display in the aggregated contact list that is associated with the low level network.
17. The method of claim 13, wherein the low level network is a first low level network, further comprising:
91004-00131LEGAL12877050.1 logging into a second low level network through the high level network;
displaying the aggregated contact list, including contacts associated with the second low level network.
91004-00131LEGAL12877050.1 logging into a second low level network through the high level network;
displaying the aggregated contact list, including contacts associated with the second low level network.
18. The method of claim 17, further comprising:
logging out of the second low level network;
removing low level contacts associated with the second low level network from the aggregated contact list.
logging out of the second low level network;
removing low level contacts associated with the second low level network from the aggregated contact list.
19. The method of claim 17, further comprising:
logging out of the first low level network;
removing low level contacts associated with the first low level network from the aggregated contact list.
logging out of the first low level network;
removing low level contacts associated with the first low level network from the aggregated contact list.
20. The method of claim 13, further comprising displaying the aggregated contact list including contacts associated with the high level network.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US74898805P | 2005-12-09 | 2005-12-09 | |
US60/748,988 | 2005-12-09 | ||
PCT/IB2006/004264 WO2008072030A2 (en) | 2005-12-09 | 2006-12-11 | Contact list display system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2634220A1 true CA2634220A1 (en) | 2007-06-09 |
CA2634220C CA2634220C (en) | 2018-06-19 |
Family
ID=38442005
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2632676A Active CA2632676C (en) | 2005-12-09 | 2006-12-11 | Message history display system and method |
CA2634220A Active CA2634220C (en) | 2005-12-09 | 2006-12-11 | Contact list display system and method |
CA2632706A Active CA2632706C (en) | 2005-12-09 | 2006-12-11 | High level network layer system and method |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2632676A Active CA2632676C (en) | 2005-12-09 | 2006-12-11 | Message history display system and method |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2632706A Active CA2632706C (en) | 2005-12-09 | 2006-12-11 | High level network layer system and method |
Country Status (6)
Country | Link |
---|---|
US (25) | US20070168529A1 (en) |
EP (3) | EP1969787A2 (en) |
JP (1) | JP2009521064A (en) |
CN (1) | CN101379785A (en) |
CA (3) | CA2632676C (en) |
WO (4) | WO2007129144A2 (en) |
Families Citing this family (78)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007129144A2 (en) | 2005-12-09 | 2007-11-15 | Ebuddy Holding B.V. | High level network layer system and method |
US10152712B2 (en) * | 2006-05-10 | 2018-12-11 | Paypal, Inc. | Inspecting event indicators |
US20070265946A1 (en) * | 2006-05-10 | 2007-11-15 | International Business Machines Corporation | Aggregating event indicators |
US20070265945A1 (en) * | 2006-05-10 | 2007-11-15 | International Business Machines Corporation | Communicating event messages corresponding to event indicators |
US7958032B2 (en) * | 2006-05-10 | 2011-06-07 | International Business Machines Corporation | Generating event messages corresponding to event indicators |
US20070286171A1 (en) * | 2006-05-23 | 2007-12-13 | Huapeng Guan | Multi-mode voice instant messaging internet phone (VIMIP) handset device |
US20080069331A1 (en) * | 2006-09-18 | 2008-03-20 | Siemens Communications, Inc. | Apparatus and method for intelligent call waiting |
JP5545953B2 (en) * | 2006-10-03 | 2014-07-09 | サムスン エレクトロニクス カンパニー リミテッド | System and method for managing XML document management server history |
US8892645B2 (en) * | 2006-12-08 | 2014-11-18 | International Business Machines Corporation | Method and system for selective sharing of flagged information in a group chat environment |
US20080250107A1 (en) * | 2007-04-03 | 2008-10-09 | Michael Holzer | Instant message archive viewing |
US8812589B2 (en) * | 2007-05-02 | 2014-08-19 | Adobe Systems Incorporated | Method and system for document-driven message-based communication |
US20080313286A1 (en) * | 2007-06-15 | 2008-12-18 | Robert Tsao | System for providing presentation via network |
US10069924B2 (en) * | 2007-07-25 | 2018-09-04 | Oath Inc. | Application programming interfaces for communication systems |
US9661267B2 (en) * | 2007-09-20 | 2017-05-23 | Lifesize, Inc. | Videoconferencing system discovery |
US8438230B2 (en) * | 2007-10-12 | 2013-05-07 | Attainia, Inc. | Method and system for contextual messaging as utilized for decision support |
US8397168B2 (en) | 2008-04-05 | 2013-03-12 | Social Communications Company | Interfacing with a spatial virtual communication environment |
US8191001B2 (en) | 2008-04-05 | 2012-05-29 | Social Communications Company | Shared virtual area communication environment based apparatus and methods |
US20090288007A1 (en) * | 2008-04-05 | 2009-11-19 | Social Communications Company | Spatial interfaces for realtime networked communications |
US20090157495A1 (en) * | 2007-12-14 | 2009-06-18 | Maud Cahuzac | Immersion into a virtual environment through a solicitation |
US7765489B1 (en) | 2008-03-03 | 2010-07-27 | Shah Shalin N | Presenting notifications related to a medical study on a toolbar |
US8245200B2 (en) * | 2008-07-11 | 2012-08-14 | International Business Machines Corporation | Method, system, and apparatus for dynamically injecting logging statements into web 2.0 javascript applications |
US8219921B2 (en) * | 2008-07-23 | 2012-07-10 | International Business Machines Corporation | Providing an ad-hoc 3D GUI within a virtual world to a non-virtual world application |
US20100125599A1 (en) * | 2008-11-17 | 2010-05-20 | International Business Machines Corporation | Obtaining trusted recommendations through discovery of common contacts in contact lists |
US8942767B2 (en) * | 2008-12-19 | 2015-01-27 | Verizon Patent And Licensing Inc. | Communications convergence and user interface systems, apparatuses, and methods |
US8190135B2 (en) * | 2009-01-22 | 2012-05-29 | Microsoft Corporation | Attribute and location based entity presentation in presence based communication systems |
US8117201B2 (en) * | 2009-05-24 | 2012-02-14 | Microsoft Corporation | Pre-populated and administrator defined groups in contacts lists |
CN101645856A (en) | 2009-08-19 | 2010-02-10 | 深圳华为通信技术有限公司 | Contact person information processing method and mobile terminal |
US8407726B2 (en) | 2009-12-31 | 2013-03-26 | International Business Machines Corporation | Collaboration in low bandwidth applications |
US20110239117A1 (en) * | 2010-03-25 | 2011-09-29 | Microsoft Corporation | Natural User Interaction in Shared Resource Computing Environment |
US20110239133A1 (en) * | 2010-03-29 | 2011-09-29 | Microsoft Corporation | Shared resource computing collaboration sessions management |
US8892628B2 (en) | 2010-04-01 | 2014-11-18 | Microsoft Corporation | Administrative interface for managing shared resources |
US8745508B2 (en) * | 2010-05-19 | 2014-06-03 | Verizon Patent And Licensing Inc. | Systems and methods for user polling |
US20110296043A1 (en) * | 2010-06-01 | 2011-12-01 | Microsoft Corporation | Managing Shared Sessions in a Shared Resource Computing Environment |
US8973021B1 (en) * | 2010-06-30 | 2015-03-03 | Emc Corporation | Method and system of facilitating Java communication |
US10904178B1 (en) * | 2010-07-09 | 2021-01-26 | Gummarus, Llc | Methods, systems, and computer program products for processing a request for a resource in a communication |
WO2012024205A2 (en) | 2010-08-16 | 2012-02-23 | Social Communications Company | Promoting communicant interactions in a network communications environment |
US9384473B2 (en) | 2010-10-21 | 2016-07-05 | Subrao Venugopal Shenoy | Methods and systems for creating online unified contact and communication management (CM) platform |
KR101756709B1 (en) * | 2011-06-17 | 2017-07-11 | 삼성전자주식회사 | Data management system and method for displaying data thereof |
US8244851B1 (en) * | 2011-10-18 | 2012-08-14 | Clintelica AB | Group network connector |
US20130055099A1 (en) * | 2011-08-22 | 2013-02-28 | Rose Yao | Unified Messaging System with Integration of Call Log Data |
WO2013059199A1 (en) | 2011-10-17 | 2013-04-25 | Disintermediation Services, Inc. | Two-way real time communication allowing asymmetric participation across multiple electronic platforms |
EP2584746A1 (en) * | 2011-10-17 | 2013-04-24 | Research In Motion Limited | Methods and devices for creating a communications log and visualisations of communications across multiple services |
US9600804B2 (en) * | 2011-10-20 | 2017-03-21 | Microsoft Technology Licensing, Llc | Providing an aggregate display of contact data from internal and external sources |
US8689243B2 (en) | 2011-11-04 | 2014-04-01 | Microsoft Corporation | Web service API for unified contact store |
CN102611641B (en) * | 2012-01-20 | 2016-01-20 | 上海量明科技发展有限公司 | Gather the method and system that instant messaging record carries out gathering |
US9641480B2 (en) * | 2012-02-05 | 2017-05-02 | Apple Inc. | Automated participant account determination for a communication session |
CN103248736B (en) * | 2012-02-08 | 2017-11-10 | 中兴通讯股份有限公司 | The method and device of display session information |
CN102831202A (en) * | 2012-08-08 | 2012-12-19 | 中兴通讯股份有限公司 | Method and system for pushing recommended friends to users of social network site |
US9331970B2 (en) * | 2012-12-05 | 2016-05-03 | Facebook, Inc. | Replacing typed emoticon with user photo |
CN103973541B (en) * | 2013-01-29 | 2018-03-20 | 中兴通讯股份有限公司 | A kind of method and apparatus that Multimedia Message is sent to group member |
CN104184771B (en) * | 2013-05-23 | 2017-12-15 | 华为终端有限公司 | Message registration call method and equipment |
US20150006510A1 (en) * | 2013-06-28 | 2015-01-01 | Vonage Network Llc | Method and apparatus for providing conversation history generated from multiple communication channels |
US9787631B2 (en) * | 2013-07-30 | 2017-10-10 | Wire Swiss Gmbh | Unified and consistent multimodal communication framework |
CN104598097A (en) * | 2013-11-07 | 2015-05-06 | 腾讯科技(深圳)有限公司 | Ordering method and device of instant messaging (IM) windows |
US9207966B2 (en) * | 2013-12-19 | 2015-12-08 | Red Hat, Inc. | Method and system for providing a high-availability application |
CN104753985B (en) | 2013-12-30 | 2018-12-28 | 腾讯科技(深圳)有限公司 | Session list display methods and device |
GB201404617D0 (en) * | 2014-03-14 | 2014-04-30 | Microsoft Corp | Instant messaging |
US10482163B2 (en) | 2014-04-23 | 2019-11-19 | Klickafy, Llc | Clickable emoji |
US10708203B2 (en) * | 2014-06-25 | 2020-07-07 | Convergence Acceleration Solutions, Llc | Systems and methods for indicating emotions through electronic self-portraits |
CN104639424B (en) * | 2015-01-07 | 2020-09-25 | 腾讯科技(深圳)有限公司 | Data transmission method and related equipment and system |
US10027615B2 (en) | 2015-02-13 | 2018-07-17 | International Business Machines Corporation | Personal communication data management in multilingual mobile device |
US10057202B2 (en) * | 2015-02-13 | 2018-08-21 | International Business Machines Corporation | Personal communication data management in multilingual mobile device |
CN106487640A (en) * | 2015-08-25 | 2017-03-08 | 平安科技(深圳)有限公司 | Many communication modules control method and server |
US10003559B2 (en) * | 2015-11-12 | 2018-06-19 | International Business Machines Corporation | Aggregating redundant messages in a group chat |
CN105791559A (en) * | 2016-02-26 | 2016-07-20 | 宁波萨瑞通讯有限公司 | Historical record reviewing method |
US9992145B2 (en) | 2016-03-18 | 2018-06-05 | International Business Machines Corporation | Email threads related to messaging content |
US20170289202A1 (en) * | 2016-03-31 | 2017-10-05 | Microsoft Technology Licensing, Llc | Interactive online music experience |
US10356025B2 (en) * | 2016-07-27 | 2019-07-16 | International Business Machines Corporation | Identifying and splitting participants into sub-groups in multi-person dialogues |
CN107819665B (en) * | 2016-09-12 | 2021-11-30 | 阿里巴巴集团控股有限公司 | Communication reminding method and device |
CN106612358B (en) * | 2016-11-30 | 2019-06-21 | 依偎科技(南昌)有限公司 | A kind of method of terminal and setting contact head image |
US10574601B2 (en) | 2017-08-03 | 2020-02-25 | International Business Machines Corporation | Managing and displaying online messages along timelines |
CN108400929B (en) * | 2018-02-08 | 2021-06-08 | 网易乐得科技有限公司 | Data processing method, device, computing equipment and medium |
US11202127B2 (en) | 2018-02-20 | 2021-12-14 | Jason Turley | User uploaded videostreaming system with social media notification features and related methods |
US11146514B2 (en) | 2018-05-07 | 2021-10-12 | Apple Inc. | Sharing content in a messaging application |
US11100813B2 (en) * | 2019-05-09 | 2021-08-24 | Salesforce.Com, Inc. | System and method for managing screen reader announcements on web pages |
JP7387396B2 (en) * | 2019-11-13 | 2023-11-28 | キヤノン株式会社 | Image processing device, its control method and program |
CN112367423A (en) * | 2020-10-23 | 2021-02-12 | 珠海格力电器股份有限公司 | Method and device for managing notification information, storage medium, and electronic device |
CN113709026B (en) * | 2021-08-04 | 2022-11-04 | 青岛海信移动通信技术股份有限公司 | Method, device, storage medium and program product for processing instant communication message |
Family Cites Families (101)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4531184A (en) * | 1981-01-30 | 1985-07-23 | Reuters, Ltd. | Conversational video system having contact selection control |
US5796393A (en) * | 1996-11-08 | 1998-08-18 | Compuserve Incorporated | System for intergrating an on-line service community with a foreign service |
US6212550B1 (en) | 1997-01-21 | 2001-04-03 | Motorola, Inc. | Method and system in a client-server for automatically converting messages from a first format to a second format compatible with a message retrieving device |
US5943478A (en) * | 1997-04-04 | 1999-08-24 | Flash Communications, Inc. | System for immediate popup messaging across the internet |
US6484196B1 (en) * | 1998-03-20 | 2002-11-19 | Advanced Web Solutions | Internet messaging system and method for use in computer networks |
JP3225924B2 (en) | 1998-07-09 | 2001-11-05 | 日本電気株式会社 | Communication quality control device |
US6571234B1 (en) * | 1999-05-11 | 2003-05-27 | Prophet Financial Systems, Inc. | System and method for managing online message board |
US7000187B2 (en) * | 1999-07-01 | 2006-02-14 | Cisco Technology, Inc. | Method and apparatus for software technical support and training |
US6549937B1 (en) | 1999-07-21 | 2003-04-15 | Microsoft Corporation | System and method for multi-protocol communication in a computer network |
AU7382100A (en) | 1999-09-16 | 2001-04-17 | Web3000, Inc. | System and method for presenting electronic messages unobtrusively |
US7191213B1 (en) | 1999-12-08 | 2007-03-13 | Avaya Technology Corp. | Instant message notification application |
US6392567B2 (en) | 2000-03-31 | 2002-05-21 | Fijitsu Limited | Apparatus for repeatedly compressing a data string and a method thereof |
US6920478B2 (en) * | 2000-05-11 | 2005-07-19 | Chikka Pte Ltd. | Method and system for tracking the online status of active users of an internet-based instant messaging system |
US6957390B2 (en) | 2000-11-30 | 2005-10-18 | Mediacom.Net, Llc | Method and apparatus for providing dynamic information to a user via a visual display |
JP2002183036A (en) * | 2000-12-14 | 2002-06-28 | Isao:Kk | Communication system, communication information processor, information terminal device, communication method, and recording medium |
US6668173B2 (en) | 2000-12-15 | 2003-12-23 | Motorola, Inc. | Instant message user location tracking system |
CA2439373A1 (en) | 2001-03-14 | 2002-09-19 | Nokia Corporation | Realization of presence management |
JP2003015919A (en) * | 2001-07-03 | 2003-01-17 | Canon Inc | Data file management device, data file management method, program and storage medium |
US6996393B2 (en) | 2001-08-31 | 2006-02-07 | Nokia Corporation | Mobile content delivery system |
DE10144070A1 (en) | 2001-09-07 | 2003-03-27 | Philips Corp Intellectual Pty | Communication network and method for controlling the communication network |
US20030061382A1 (en) * | 2001-09-21 | 2003-03-27 | Dell Products L.P. | System and method for naming hosts in a distributed data processing system |
US7743404B1 (en) * | 2001-10-03 | 2010-06-22 | Trepp, LLC | Method and system for single signon for multiple remote sites of a computer network |
NO315679B1 (en) * | 2001-10-19 | 2003-10-06 | Dmates As | Rich communication over the internet |
US6993327B2 (en) | 2001-10-29 | 2006-01-31 | Motorola, Inc. | Multicast distribution of presence information for an instant messaging system |
US7228414B2 (en) | 2001-11-02 | 2007-06-05 | General Instrument Corporation | Method and apparatus for transferring a communication session |
US7042879B2 (en) | 2001-11-02 | 2006-05-09 | General Instrument Corporation | Method and apparatus for transferring a communication session |
US20030131061A1 (en) | 2001-11-28 | 2003-07-10 | Active Buddy, Inc. | Transparent proxy server for instant messaging system and methods |
DE10200201A1 (en) | 2002-01-04 | 2003-07-24 | Daimler Chrysler Ag | Cycle-based timed communication system |
US7689649B2 (en) * | 2002-05-31 | 2010-03-30 | Aol Inc. | Rendering destination instant messaging personalization items before communicating with destination |
US7779076B2 (en) * | 2002-05-31 | 2010-08-17 | Aol Inc. | Instant messaging personalization |
US20030210265A1 (en) * | 2002-05-10 | 2003-11-13 | Haimberg Nadav Y. | Interactive chat messaging |
US8577983B2 (en) * | 2002-07-12 | 2013-11-05 | Pace Plc | System and method for notifying an instant message recipient of receipt of a message |
US8150922B2 (en) | 2002-07-17 | 2012-04-03 | Research In Motion Limited | Voice and text group chat display management techniques for wireless mobile terminals |
US7401158B2 (en) * | 2002-09-16 | 2008-07-15 | Oracle International Corporation | Apparatus and method for instant messaging collaboration |
US7933957B2 (en) * | 2002-09-17 | 2011-04-26 | At&T Intellectual Property Ii, L.P. | Tracking email and instant messaging (IM) thread history |
US7657598B2 (en) * | 2002-09-17 | 2010-02-02 | At&T Intellectual Property I, L.P. | Address book for integrating email and instant messaging (IM) |
US7185059B2 (en) | 2002-09-17 | 2007-02-27 | Bellsouth Intellectual Property Corp | Multi-system instant messaging (IM) |
US7035942B2 (en) | 2002-09-17 | 2006-04-25 | Bellsouth Intellectual Property Corp. | Server-based message protocol translation |
US7725542B2 (en) | 2003-02-10 | 2010-05-25 | At&T Intellectual Property I, L.P. | Forwarding IM messages to E-mail |
US20090125591A1 (en) * | 2002-09-30 | 2009-05-14 | Ficus Kirkpatrick | Instant messaging proxy apparatus and method |
US7426382B2 (en) | 2002-10-09 | 2008-09-16 | Motorola, Inc. | Contact validation and trusted contact updating in mobile wireless communications devices |
US7240214B2 (en) | 2002-10-25 | 2007-07-03 | Yahoo!, Inc. | Centrally controllable instant messaging system |
US7590696B1 (en) | 2002-11-18 | 2009-09-15 | Aol Llc | Enhanced buddy list using mobile device identifiers |
US7636755B2 (en) * | 2002-11-21 | 2009-12-22 | Aol Llc | Multiple avatar personalities |
EP1428499B1 (en) * | 2002-12-10 | 2006-10-18 | Kao Corporation | Aqueous hair cleansing composition |
JP2004201029A (en) * | 2002-12-18 | 2004-07-15 | Canon Inc | Address book management method |
US8122136B2 (en) * | 2002-12-18 | 2012-02-21 | Cisco Technology, Inc. | Methods and apparatus for providing security to a computerized device |
US7313760B2 (en) | 2002-12-19 | 2007-12-25 | Microsoft Corporation | Contact picker |
US7360174B2 (en) * | 2002-12-19 | 2008-04-15 | Microsoft Corporation | Contact user interface |
US20040158610A1 (en) * | 2003-02-10 | 2004-08-12 | Davis Joel A. | Client proxying for instant messaging |
US7725541B2 (en) * | 2003-02-10 | 2010-05-25 | At&T Intellectual Property I, L.P. | Forwarding to automatically prioritized IM accounts based upon priority and presence |
JP2006520053A (en) | 2003-03-03 | 2006-08-31 | アメリカ オンライン インコーポレイテッド | How to use an avatar to communicate |
AU2004200809B2 (en) | 2003-03-07 | 2006-05-11 | Samsung Electronics Co., Ltd. | Method and system for providing data services to mobile communication terminals and mobile communication terminal therefor |
US20050038868A1 (en) * | 2003-05-19 | 2005-02-17 | Spicer Jeffrey J. | Web form host |
CA2526187C (en) * | 2003-05-20 | 2014-01-21 | America Online, Inc. | Presence and geographic location notification |
US7167705B2 (en) * | 2003-06-27 | 2007-01-23 | Oracle International Corporation | Roaming across different access mechanisms and network technologies |
GB0316079D0 (en) * | 2003-07-09 | 2003-08-13 | Seventh Wave Systems Ltd | Automated communication for financial information |
JP2005031861A (en) * | 2003-07-09 | 2005-02-03 | Digicell Entertainment Co Ltd | Architecture and service system for community platform and usage of service system |
WO2005008432A2 (en) | 2003-07-11 | 2005-01-27 | Sonolink Communications Systems, Llc | System and method for advanced rule creation and management within an integrated virtual workspace |
US20050038876A1 (en) | 2003-08-15 | 2005-02-17 | Aloke Chaudhuri | System and method for instant match based on location, presence, personalization and communication |
US7288028B2 (en) * | 2003-09-26 | 2007-10-30 | Microsoft Corporation | Method and apparatus for quickly joining an online game being played by a friend |
US7451218B2 (en) * | 2003-10-14 | 2008-11-11 | At&T Intellectual Property I, L.P. | Automated instant messaging state control based upon email persona utilization |
US20050091272A1 (en) | 2003-10-23 | 2005-04-28 | Smith Walter R. | Contact management |
US7930757B2 (en) * | 2003-10-31 | 2011-04-19 | Adobe Systems Incorporated | Offline access in a document control system |
US7389324B2 (en) * | 2003-11-07 | 2008-06-17 | Plaxo, Inc. | Viral engine for network deployment |
US7330903B2 (en) * | 2003-11-17 | 2008-02-12 | International Business Machines Corporation | Method, computer program product, and system for routing messages in a computer network comprising heterogenous databases |
US20050119910A1 (en) | 2003-12-01 | 2005-06-02 | International Business Machines Corporation | Content update notification |
JP2005208941A (en) * | 2004-01-22 | 2005-08-04 | Dowango:Kk | Server system, message communication method and program |
US20050223328A1 (en) | 2004-01-30 | 2005-10-06 | Ashish Ashtekar | Method and apparatus for providing dynamic moods for avatars |
US9398152B2 (en) | 2004-02-25 | 2016-07-19 | Avaya Inc. | Using business rules for determining presence |
WO2005089239A2 (en) | 2004-03-13 | 2005-09-29 | Cluster Resources, Inc. | System and method of providing a self-optimizing reservation in space of compute resources |
WO2005089286A2 (en) | 2004-03-15 | 2005-09-29 | America Online, Inc. | Sharing social network information |
FR2868229A1 (en) * | 2004-03-25 | 2005-09-30 | France Telecom | COMMUNICATION STATE PUBLISHING GATEWAY |
US7487455B2 (en) | 2004-04-19 | 2009-02-03 | Yahoo! Inc. | Techniques for simultaneously displaying a background page and an interactive content page in an application window |
WO2005112359A2 (en) * | 2004-05-10 | 2005-11-24 | Yahoo Inc. | Clearinghouse for messages between disparate im networks |
US7353466B2 (en) * | 2004-05-28 | 2008-04-01 | Microsoft Corporation | System and method for generating message notification objects on dynamically scaled timeline |
US7509414B2 (en) * | 2004-10-29 | 2009-03-24 | International Business Machines Corporation | System and method for collection, aggregation, and composition of metrics |
US7587501B2 (en) * | 2004-12-03 | 2009-09-08 | Microsoft Corporation | System, method, and computer storage medium for establishing sharing of resources with reciprocal requests included in sharing messages |
US20060168054A1 (en) * | 2004-12-13 | 2006-07-27 | Ebay Inc. | Messaging method and apparatus |
US8055715B2 (en) * | 2005-02-01 | 2011-11-08 | i365 MetaLINCS | Thread identification and classification |
US7593925B2 (en) | 2005-02-25 | 2009-09-22 | Microsoft Corporation | Method and system for locating contact information collected from contact sources |
US7496379B2 (en) | 2005-04-22 | 2009-02-24 | Kyocera Wireless Corp. | System and method for providing SMS contact information to a wireless mobile device |
US7313133B2 (en) | 2005-05-12 | 2007-12-25 | Yahoo! Inc. | Selecting a network based on metrics for real time communication |
US8107495B2 (en) * | 2005-05-13 | 2012-01-31 | Yahoo! Inc. | Integrating access to audio messages and instant messaging with VOIP |
US7548922B2 (en) * | 2005-05-17 | 2009-06-16 | International Business Machines Corporation | Customized and consolidated bookmarks |
US20070043878A1 (en) * | 2005-08-18 | 2007-02-22 | Microsoft Corporation | Virtual robot communication format customized by endpoint |
US7512619B2 (en) | 2005-09-19 | 2009-03-31 | International Business Machines Corporation | Real time work queue notification |
ITMI20052290A1 (en) | 2005-11-30 | 2007-06-01 | Pasqua Roberto Della | INSTANTANEOUS MESSAGING SERVICE WITH MINIMIZED USER INTERFACE |
WO2007129144A2 (en) * | 2005-12-09 | 2007-11-15 | Ebuddy Holding B.V. | High level network layer system and method |
GB2433795A (en) | 2005-12-23 | 2007-07-04 | Nats | Air traffic control system |
US20070300164A1 (en) | 2006-06-21 | 2007-12-27 | Kulvir Singh Bhogal | Method and system for managing instant message logs from within a calendar application |
US7886000B1 (en) | 2006-06-27 | 2011-02-08 | Confluence Commons, Inc. | Aggregation system for social network sites |
WO2008072028A2 (en) | 2006-12-12 | 2008-06-19 | Ebuddy Holding B.V. | Event notification system and method |
US8135774B2 (en) | 2006-12-27 | 2012-03-13 | Genesys Telecommunications Laboratories, Inc. | Virtual contact center with dynamic routing |
US7523138B2 (en) * | 2007-01-11 | 2009-04-21 | International Business Machines Corporation | Content monitoring in a high volume on-line community application |
US20080261569A1 (en) * | 2007-04-23 | 2008-10-23 | Helio, Llc | Integrated messaging, contacts, and mail interface, systems and methods |
JP2009117974A (en) | 2007-11-02 | 2009-05-28 | Fujifilm Corp | Interest information creation method, apparatus, and system |
US9183513B2 (en) * | 2008-05-27 | 2015-11-10 | Intel Corporation | Aggregration, standardization and extension of social networking contacts to enhance a television consumer experience |
US8503300B2 (en) | 2008-10-17 | 2013-08-06 | Verizon Patent And Licensing Inc. | Efficient messaging over internet protocol |
US20100153284A1 (en) * | 2008-12-17 | 2010-06-17 | Black Drumm, Inc. | Methods and systems to use an aggregated contact list for sharing online information |
JP6212993B2 (en) | 2013-07-03 | 2017-10-18 | 株式会社リコー | Rotation angle detection device, image processing device, and rotation angle detection method |
-
2006
- 2006-12-11 WO PCT/IB2006/004205 patent/WO2007129144A2/en active Application Filing
- 2006-12-11 EP EP06851959A patent/EP1969787A2/en not_active Withdrawn
- 2006-12-11 CN CNA2006800525713A patent/CN101379785A/en active Pending
- 2006-12-11 CA CA2632676A patent/CA2632676C/en active Active
- 2006-12-11 WO PCT/IB2006/004264 patent/WO2008072030A2/en active Application Filing
- 2006-12-11 US US11/637,316 patent/US20070168529A1/en not_active Abandoned
- 2006-12-11 WO PCT/IB2006/004200 patent/WO2007110703A2/en active Application Filing
- 2006-12-11 EP EP06851090A patent/EP1969785A2/en not_active Withdrawn
- 2006-12-11 CA CA2634220A patent/CA2634220C/en active Active
- 2006-12-11 US US11/637,514 patent/US8037212B2/en active Active
- 2006-12-11 US US11/637,954 patent/US7730144B2/en active Active
- 2006-12-11 EP EP06851091.6A patent/EP1969786B1/en active Active
- 2006-12-11 US US11/637,964 patent/US9250984B2/en active Active
- 2006-12-11 US US11/637,268 patent/US8700713B2/en active Active
- 2006-12-11 JP JP2008549070A patent/JP2009521064A/en not_active Revoked
- 2006-12-11 WO PCT/IB2006/004204 patent/WO2007129143A2/en active Application Filing
- 2006-12-11 CA CA2632706A patent/CA2632706C/en active Active
-
2010
- 2010-03-10 US US12/721,538 patent/US8356070B2/en active Active
- 2010-05-05 US US12/774,700 patent/US8510395B2/en active Active
-
2011
- 2011-06-21 US US13/165,709 patent/US8230135B2/en active Active
-
2012
- 2012-07-20 US US13/554,996 patent/US8402179B1/en active Active
- 2012-12-28 US US13/730,562 patent/US20130179497A1/en not_active Abandoned
-
2013
- 2013-03-19 US US13/847,423 patent/US8806084B2/en not_active Ceased
- 2013-07-12 US US13/941,354 patent/US9584453B2/en active Active
-
2014
- 2014-08-12 US US14/458,028 patent/US10389666B2/en active Active
- 2014-09-19 US US14/491,895 patent/USRE46328E1/en active Active
-
2015
- 2015-11-30 US US14/954,887 patent/US10523612B2/en active Active
-
2016
- 2016-12-05 US US15/369,112 patent/US10536412B2/en active Active
-
2019
- 2019-08-20 US US16/546,265 patent/US10735364B2/en active Active
- 2019-12-06 US US16/706,652 patent/US11012393B2/en active Active
- 2019-12-31 US US16/731,712 patent/US10986057B2/en active Active
-
2020
- 2020-08-04 US US16/985,046 patent/US11438293B2/en active Active
-
2021
- 2021-04-14 US US17/230,956 patent/US11438291B2/en active Active
- 2021-05-18 US US17/324,057 patent/US20220014490A1/en active Pending
-
2022
- 2022-07-28 US US17/876,491 patent/US11689489B2/en active Active
- 2022-07-28 US US17/876,470 patent/US20230006959A1/en active Pending
-
2023
- 2023-05-19 US US18/320,733 patent/US20240129266A1/en active Pending
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11012393B2 (en) | Contact list aggregation and display |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |