Abstract:
Systems and methods are disclosed for tracking and displaying the logon status of selected co-users of an on-line or network system in real time to a tracking user in a unique graphical interface. The invention provides user definable on-line co-user lists, or “buddy lists,” which track specific co-users in real-time automatically. When a user logs on to a system, one or more of the user's buddy lists are presented to the buddy list system. The buddy list system attempts to match co-users currently logged into the system with the entries on the user's buddy list. Any matches are displayed to the user. As co-users logon and logoff, a user's buddy list is updated to reflect these changes. An indication can also be added to show that a co-user just logged on or just left the system.
Abstract:
Communicating between electronic devices involves sending messages between the electronic devices. An original message having an original source indicator and an intended destination indicator identified is sent. A reply to that original message is sent by the recipient of the original message. The reply message has a reply source indicator and a reply destination indicator. A communication based on the reply message is sent. The communication based on the reply message has a reply source indicator that is the same as the intended destination indicator identified by the sender of the original message. In one example, a message is sent from computer operating an instant messaging program and forwarded to a mobile telephone. The reply sent from the mobile telephone is provided to the sender of the original message without revealing the telephone number of the mobile telephone to which the original instant message was forwarded.
Abstract:
A graphical user interface on a display device of a computer enables communications using a computer service. The graphical user interface includes a list of potential message recipients selected by a user as significant to the user. The graphical user interface also includes a mobile device identifier associated with one or more of the listed potential message recipients and a user account identifier associated with one or more of the listed potential message recipients. At least one of the listed potential recipients includes a mobile device identifier as the only available conduit for data delivery to the potential message recipient using the computer service.
Abstract:
Techniques are described for forwarding an instant message addressed to an intended instant messaging recipient to the recipient's mobile telephone when the recipient's mobile telephone number is known to the instant message sender. In one example, an instant message is forwarded to the intended recipient's mobile telephone number when the instant message sender's contact information for the intended recipient includes an instant message address (e.g., a screen name or other type of instant message identifier) and a mobile telephone number, without dependence upon the intended recipient' s presence on the instant message (IM) system or through actual login or registration with an IM forwarding service. In another example, an instant message addressed to an intended instant messaging recipient is forwarded to the recipient's mobile telephone when the recipient is known to the instant message sender.
Abstract:
A client system is configured to submit a request to a first instant messaging system for access to the first instant messaging service The request includes an online identity that is currently being used to access a second instant messaging service associated with the second instant messaging system. The second instant messaging system is configured to send a message to the first instant messaging system that indicates the online identity is currently being used to access a second instant messaging service associated with the second instant messaging system. The first instant messaging system maintains a profile that is updated to indicate that the online identity is currently being used to access the first instant messaging service and, in response to the message, the profile is also updated to indicate that the online identity is currently begin used to access the second instant messaging service.
Abstract:
Providing supplemental contact information for an individual referenced in an electronic message typically includes receiving an electronic message, examining the electronic message, detecting an identifier for a referenced individual contained in the electronic message, and making supplemental contact information for the referenced individual available to a recipient of the electronic message. The supplemental contact information may include information that is in addition to information contained in the electronic message. The supplemental contact information may include at least one of an e-mail address, a screen name, a telephone number, a facsimile number, and a mailing address, each of which is associated with the referenced individual.
Abstract:
In the event of an unintentional interruption, a token issued by a host system to a client system is used to reestablish communications without disrupting applications on the client system. If the host system provided an Internet Protocol address to the client system to be used during the interrupted communications session, the host system reserves the communications address during an interruption in communications for a period sufficient to permit reestablishment of communications using the reserved address.
Abstract:
The performance of a network system having one or more requestor nodes, one or more provider nodes, and one or more intermediate nodes is improved by determining the digital signature of a received file, looking up the digital signature in an index of signatures, and forwarding a previously compressed version of the requested file when the digital signature is found in the index of signatures.
Abstract:
Communicating between electronic devices involves sending messages between the electronic devices. An original message having an original source indicator and an intended destination indicator identified is sent. A reply to that original message is sent by the recipient of the original message. The reply message has a reply source indicator and a reply destination indicator. A communication based on the reply message is sent. The communication based on the reply message has a reply source indicator that is the same as the intended destination indicator identified by the sender of the original message. In one example, a message is sent from computer operating an instant messaging program and forwarded to a mobile telephone. The reply sent from the mobile telephone is provided to the sender of the original message without revealing the telephone number of the mobile telephone to which the original instant message was forwarded.
Abstract:
A sender's degrees of separation from a recipient may be used to aid in spam filtering or to otherwise handle a communication. The “degrees of separation” represent a metric used to quantify whether/how the recipient is linked to the sender through intermediary people or other entities. For example, a recipient may know a first user (first degree of separation) and the first user may know a second user (second degree of separation) who knows the sender of an e-mail. In this case, the sender is separated from the recipient by two degrees of separation (by two other contact). A level of “trust” or “legitimacy” about a sender's communication can be inferred by looking at whether the sender is linked to an intended recipient. Typically, user contact lists are evaluated to determine the number of degrees (or hops) are required to link or relate two users.