Methods and apparatuses for selectively accessing an application

ABSTRACT

In one embodiment, the methods and apparatuses request an application; detect a user requesting the application; detect a profile associated with the user; and grant permission to access the application based on an access parameter.

RELATED APPLICATION

The present application is related to and claims the benefit of U.S.Provisional Application No. 60/883,936, filed on Jan. 8, 2007, entitled“Method and Apparatus for Selectively Distributing an Apparatus to aParticipant” by Weidong Chen, Lei Zhu, Min Zhu, Chris Kangas, MatthewShepard and David Knight, which application is incorporated herein byreference.

FIELD OF INVENTION

The present invention relates generally to selectively accessing anapplication.

BACKGROUND

There has been an increased use in collaboration sessions that areInternet or web-based to communicate with employees, vendors, andclients. During these collaboration sessions, information is typicallyexchanged between multiple participants. This exchanged information mayinclude audio, graphical, and/or textual information.

There has also been an increased use of social networks such asFriendster, Linkedin, and Spooke to facilitate connections between therespective community members.

SUMMARY

In one embodiment, the methods and apparatuses request an application;detect a user requesting the application; detect a profile associatedwith the user; and grant permission to access the application based onan access parameter.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of this specification, illustrate and explain one embodiment of themethods and apparatuses for selectively accessing an application. In thedrawings,

FIG. 1 is a diagram illustrating an environment within which the methodsand apparatuses for selectively accessing an application areimplemented;

FIG. 2 is a simplified block diagram illustrating one embodiment inwhich the methods and apparatuses for selectively accessing anapplication are implemented;

FIG. 3 is a simplified block diagram illustrating a system, consistentwith one embodiment of the methods and apparatuses for selectivelyaccessing an application;

FIG. 4 is a simplified block diagram illustrating a system, consistentwith one embodiment of the methods and apparatuses for selectivelyaccessing an application;

FIG. 5 is an exemplary record for use with the methods and apparatusesfor selectively accessing an application;

FIG. 6 is a flow diagram consistent with one embodiment of the methodsand apparatuses for selectively accessing an application;

FIG. 7 is a flow diagram consistent with one embodiment of the methodsand apparatuses for selectively accessing an application;

FIG. 8 is a flow diagram consistent with one embodiment of the methodsand apparatuses for selectively accessing an application;

FIG. 9 is a flow diagram consistent with one embodiment of the methodsand apparatuses for selectively accessing an application;

FIG. 10 is a flow diagram consistent with one embodiment of the methodsand apparatuses for selectively accessing an application; and

FIG. 11 is a flow diagram consistent with one embodiment of the methodsand apparatuses for selectively accessing an application;

FIG. 12 is a flow diagram consistent with one embodiment of the methodsand apparatuses for selectively accessing an application;

FIG. 13 is a flow diagram consistent with one embodiment of the methodsand apparatuses for selectively accessing an application;

FIG. 14 is a flow diagram consistent with one embodiment of the methodsand apparatuses for selectively accessing an application; and

FIG. 15 is a flow diagram consistent with one embodiment of the methodsand apparatuses for selectively accessing an application.

DETAILED DESCRIPTION

The following detailed description of the methods and apparatuses forselectively accessing an application refers to the accompanyingdrawings. The detailed description is not intended to limit the methodsand apparatuses for selectively accessing an application. Instead, thescope of the methods and apparatuses for selectively accessing anapplication is defined by the appended claims and equivalents. Thoseskilled in the art will recognize that many other implementations arepossible, consistent with the present invention.

References to a device include a device utilized by a user such as adesktop computer, a portable computer, a personal digital assistant, avideo phone, a landline telephone, a cellular telephone, and a devicecapable of receiving/transmitting an electronic signal.

References to a collaboration session include a plurality of devicesthat are configured to view content submitted by one of the devices. Forexample, the collaboration session may include a data conference or avideo conference through a network, a phone line, and/or the Internet.Further, the communications between participants may be through textmessaging, audio conferencing, video conferencing, email, shortmessaging service, and the like.

References to a participant include a user of a device.

Reference to an application include application software for use by theparticipant.

References to a presenter include a participant that shares contentshared with other participants.

References to an attendee include a participant that receives contentshared by another participant. The attendees are capable of viewingcontent that is offered by the presenter. In some instances, theattendee is capable of modifying the content shared by the presenter.

FIG. 1 is a diagram illustrating an environment within which the methodsand apparatuses for selectively accessing an application areimplemented. The environment includes an electronic device 110 (e.g., acomputing platform configured to act as a client device, such as acomputer, a personal digital assistant, and the like), a user interface115, a network 120 (e.g., a local area network, a home network, theInternet), and a server 130 (e.g., a computing platform configured toact as a server).

In one embodiment, one or more user interface 115 components are madeintegral with the electronic device 110 (e.g., keypad and video displayscreen input and output interfaces in the same housing such as apersonal digital assistant. In other embodiments, one or more userinterface 115 components (e.g., a keyboard, a pointing device such as amouse, a trackball, etc.), a microphone, a speaker, a display, a cameraare physically separate from, and are conventionally coupled to,electronic device 110. In one embodiment, the user utilizes interface115 to access and control content and applications stored in electronicdevice 110, server 130, or a remote storage device (not shown) coupledvia network 120.

In accordance with the invention, embodiments selectively accessing anapplication below are executed by an electronic processor in electronicdevice 110, in server 130, or by processors in electronic device 110 andin server 130 acting together. Server 130 is illustrated in FIG. 1 asbeing a single computing platform, but in other instances are two ormore interconnected computing platforms that act as a server.

FIG. 2 is a simplified diagram illustrating an exemplary architecture inwhich the methods and apparatuses for selectively accessing anapplication are implemented. The exemplary architecture includes aplurality of electronic devices 202, a server device 210, and a network201 connecting electronic devices 202 to server 210 and each electronicdevice 202 to each other. The plurality of electronic devices 202 areeach configured to include a computer-readable medium 209, such asrandom access memory, coupled to an electronic processor 208. Processor208 executes program instructions stored in the computer-readable medium209. In one embodiment, a unique user operates each electronic device202 via an interface 115 as described with reference to FIG. 1.

The server device 130 includes a processor 211 coupled to acomputer-readable medium 212. In one embodiment, the server device 130is coupled to one or more additional external or internal devices, suchas, without limitation, a secondary data storage element, such asdatabase 240.

In one instance, processors 208 and 211 are manufactured by IntelCorporation, of Santa Clara, Calif. In other instances, othermicroprocessors are used.

In one embodiment, the plurality of client devices 202 and the server210 include instructions for selectively accessing an application. Inone embodiment, the plurality of computer-readable media 209 and 212contain, in part, the customized application. Additionally, theplurality of client devices 202 and the server 210 are configured toreceive and transmit electronic messages for use with the customizedapplication. Similarly, the network 210 is configured to transmitelectronic messages for use with the customized application.

One or more user applications are stored in media 209, in media 212, ora single user application is stored in part in one media 209 and in partin media 212. In one instance, a stored user application, regardless ofstorage location, is made customizable based on selectively accessing anapplication as determined using embodiments described below.

In one embodiment, the dynamic social network system utilizes thecollaboration sessions to share information and communicate among theparticipants. For example, collaboration sessions are configured toprovide real-time communication between multiple participants. In oneembodiment, the content that is shared among the participants of thecollaboration session is content that is displayed on the desktop of oneof the participants.

FIG. 3 illustrates one embodiment of a system 300. In one embodiment,the system 300 is embodied within the server 130. In another embodiment,the system 300 is embodied within the electronic device 110. In yetanother embodiment, the system 300 is embodied within both theelectronic device 110 and the server 130.

In one embodiment, the system 300 includes a conferencing module 310, anapplications grouping 320, an on-line community grouping 330, a companygrouping 340, and a professional organization grouping 350.

In one embodiment, the conferencing module 310 communicates with theapplications grouping 320, the on-line community grouping 330, thecompany grouping 340, and the professional organization grouping 350. Inone embodiment, the conferencing module 310 coordinates tasks, requests,and communications between and within the applications grouping 320, theon-line community grouping 330, the company grouping 340, and theprofessional organization grouping 350.

In one embodiment, the conferencing module 310 allows the differentgroupings to communicate and hold collaboration sessions between userswithin each grouping and across multiple groupings.

In one embodiment, the conferencing module 310 detects content that isutilized by one of the users within one of the groupings. In oneembodiment, the content is utilized in connection with multiple deviceswithin a collaboration session between multiple parties. For example,the collaboration session may include a data conference or a videoconference through a network, a phone line, and/or the Internet.

In one embodiment, the content is a document utilized within acollaboration session. In another embodiment, the content is audiovisual media that is utilized within a collaboration session.

In one embodiment, the conferencing module 310 monitors input fromvarious interface devices connected to devices that are participating inthe collaboration session. These various interface devices include akeyboard, a pointing device, a microphone, a telephone, a video camera,and the like.

In one embodiment, the applications grouping 320 includes users that arerelated to a particular application. For example, multiple users thatare interested in a particular application can form a user's group thatis represented by the applications grouping 320.

In another embodiment, the applications grouping 320 includes repositoryof different applications that are made available to participants thatmake up the on-line community grouping 330, the company grouping 340,and the professional organization grouping 350. In one embodiment,access to the applications within the repository is selectivelycontrolled based on an access rights parameter.

In one embodiment, the on-line community grouping 330 includes usersthat are related to a particular community group such as Friendster oranother social networking group.

In one embodiment, the company grouping 340 includes users that arerelated to a particular company. For example, multiple users that areemployees at a particular company are related to each other and arerepresented by the company grouping 340.

In one embodiment, the professional organization grouping 350 includesusers that are related to a particular professional organization. Forexample, multiple users that are members of a particular professionalorganization are related to each other and are represented by theprofessional organization grouping 350.

The system 300 in FIG. 3 is shown for exemplary purposes and is merelyone embodiment of the methods and apparatuses for selectively accessingan application. Additional modules may be added to the system 300without departing from the scope of the methods and apparatuses forselectively accessing an application. Similarly, modules may be combinedor deleted without departing from the scope of the methods andapparatuses for selectively accessing an application.

FIG. 4 illustrates one embodiment of a system 400. In one embodiment,the system 400 facilitates a collaboration session between multipleparties. In one embodiment, the system 400 includes a presenter device410, a conference interface 420, and an attendee device 430. In oneembodiment, the presenter device 410 and the attendee device 430 areutilized by a presenter user and an attendee user, respectively.

In one embodiment, the presenter device 410 shares content with theattendee device 430. In one embodiment, the attendee device 430 alsoshares content with the presenter device 410. The conference interface420 monitors the communications between the presenter device 410 and theattendee device 430.

FIG. 5 illustrates one embodiment of a system 500. In one embodiment,the system 500 is embodied within the server 130. In another embodiment,the system 500 is embodied within the electronic device 110. In yetanother embodiment, the system 500 is embodied within both theelectronic device 110 and the server 130.

In one embodiment, the system 500 includes an interface module 510, astorage module 520, a content recognition module 530, a profile managermodule 540, a control module 550, a title recognition module 560, anattendee recognition module 570, a security manager module 580, a ratingmanager 590, and an application manager 595.

In one embodiment, the control module 550 communicates with theinterface module 510, the storage module 520, the content recognitionmodule 530, the profile manager module 540, the title recognition module560, the attendee recognition module 570, the security manager module580, the rating manager 590, and the application manager 595. In oneembodiment, the control module 350 coordinates tasks, requests, andcommunications between the interface module 510, the storage module 520,the content recognition module 530, the profile manager module 540, thetitle recognition module 560, the attendee recognition module 570, thesecurity manager module 580, the rating manager 590, and the applicationmanager 595.

In one embodiment, the interface module 510 receives a signal from oneof the electronic devices 110. In one embodiment, the electronic devices110 are participating in a collaboration session. For example, thesystem 500 monitors the collaboration session between the presenterdevice 410 and the attendee device 430. In another embodiment, theinterface module 510 delivers a signal to one of the electronic devices110.

In one embodiment, the interface module 510 monitors input from variousinterface devices connected to devices that are participating in thecollaboration session. These various interface devices include akeyboard, a pointing device, a microphone, a telephone, a video camera,and the like. Further, the interface module 510 also monitors theidentity of the participants of a collaboration session, the title ofthe collaboration session, and the content exchanged in thecollaboration session.

In one embodiment, the storage module 520 stores a record including alist of attributes associated with the each device participating in acollaboration session. An exemplary list of attributes is shown in arecord 600 within FIG. 6.

In another embodiment, the storage module 520 stores the collaborationsession. In one embodiment, the storage module 520 stores the contentthat is presented during the collaboration session. In anotherembodiment, the storage module 520 stores the annotations and commentsproduced by the participants of the collaboration session.

In another embodiment, the storage module 520 stores scoring produced bythe rating manager 590. In one embodiment, the scoring values for eachuser are stored.

In yet another embodiment, the storage module 520 stores applicationsreferenced within the application module 595.

In one embodiment, the content recognition module 530 detects contentthat is utilized by the user in connection with the device. In oneembodiment, the content is utilized in connection with multiple deviceswithin a collaboration session between multiple parties. For example,the collaboration session may include a data conference or a videoconference through a network, a phone line, and/or the Internet.

In one embodiment, the content is a document utilized within acollaboration session. In another embodiment, the content is audiovisual media that is utilized within a collaboration session.

In one embodiment, the content recognition module 530 detects thecontent exchanged between the presenter device 410 and the attendeedevice 430. In one embodiment, the content is textual. In anotherembodiment, the content is audio. In another embodiment, the content isgraphical.

In one embodiment, the content recognition module 530 analyzes thiscontent to identify keywords. In one embodiment, the keywords can beidentified by the frequency in which the words are utilized. In anotherembodiment, the keywords are identified by the context of the relatedwords. For example, if the content being exchanged between the presenterdevice 410 and the attendee device 430 relate to computers, then thefrequent use of terms such as memory, RAM, and chips may have increasedsignificance during the collaboration session.

In one embodiment, the profile manager module 540 organizes a pluralityof profiles. In one embodiment, each profile corresponds to eachindividual user. In another embodiment, each individual user may havemultiple profiles.

In one embodiment, a profile describes attributes of the associateduser. For example, the profile may include areas of interest of theassociated user. Further, the profile may also describe the areas ofexpertise corresponding to the associated user.

In another embodiment, the profile may also describe the relationalhierarchy between multiple users. For example, the profile may alsodescribe the title and level of the user within a company ororganization.

In one embodiment, the title recognition module 560 detects the titlesthat describe or label collaboration sessions. In one embodiment,collaboration sessions have corresponding titles or descriptions thatdescribe the purpose or content of the collaboration sessions. Forexample, a particular collaboration session may have a title “MailServer Maintenance”. The title of this particular collaboration sessionmay be stored within a calendaring system that helps participants ofthis particular collaboration session keep track of their respectiveschedules.

In one embodiment, the participant recognition module 570 detects theidentities of the participants of the collaboration session. In oneembodiment, collaboration sessions have schedule participants that arescheduled to participate in a particular collaboration session. Further,there may be additional or fewer actual participants that join theparticular collaboration session. In one embodiment, the participantrecognition module 570 detects both scheduled and actual participantsfor a particular collaboration session.

In one embodiment, the participant recognition module 570 detects theidentities of the participants of the collaboration session. In oneembodiment, collaboration sessions have schedule participants that arescheduled to participate in a particular collaboration session. Further,there may be additional or fewer actual participants that join theparticular collaboration session.

In one embodiment, the participant recognition module 570 detectsdistinct participants through their respective associated profiles.

In one embodiment, the security manager module 580 controls access tothe profiles of each user based on the information of a requestingparty. For example, if the requesting party is authorized to gain accessto other profiles, the requesting party can search for profiles thatmatch a particular criteria such as subject expertise, experience, andthe like.

In one embodiment, the rating manager module 590 ranks and rates theavailable profiles based on a match between a request and the profileinformation. For example, a user may request a search for other userswith an expertise in a particular area of specialty. The rating managermodule 590 may review the profiles of other users and select and rankthe corresponding profiles based on the whether the profiles match thearea of specialty requested by the user.

In another embodiment, the rating manager module 590 ranks and rates theavailable applications based on a match between a request for anapplication and parameters associated with the participants that arerequesting the application.

In one embodiment, the application manager 595 controls the availabilityand distribution of the applications to potential recipientparticipants. In one example, the availability of the application to thepotential recipient participant may depend on the authorization of theparticular participant. In another embodiment, the application manager595 tracks the distribution of the applications to various participants.

In one embodiment, the system 500 suggests additional participants for aparticular collaboration session based on the invited participants. Inanother embodiment, the system 500 suggests additional participants fora particular collaboration session based on the title or topic of theparticular collaboration session.

The system 500 in FIG. 5 is shown for exemplary purposes and is merelyone embodiment of the methods and apparatuses for selectively accessingan application. Additional modules may be added to the system 500without departing from the scope of the methods and apparatuses forselectively accessing an application. Similarly, modules may be combinedor deleted without departing from the scope of the methods andapparatuses for selectively accessing an application.

FIG. 6 illustrates an exemplary record 600 for use with the methods andapparatuses for selectively accessing an application. In one embodiment,the record 600 illustrates an exemplary record associated with a profilecorresponding to a user. In one embodiment, the profile associated withthe user is initiated based on the participation of the user during acollaboration session. Further, the profile associated with the user isupdated and refined based on the participation of the user during acollaboration session.

In one embodiment, there are multiple records such that each record 600is associated with a particular profile corresponding to a particularuser. In another embodiment, multiple profiles are associated with thesame user and each profile is represented by a record 600.

In one embodiment, the record 600 includes areas of expertise field 610,a collaboration frequency field 620, a participant history field 630, acollaboration history field 640, a hierarchy field 650, a colleaguesfield 660, and an applications field 670. In one embodiment, the record600 resides within the storage module 520. In one embodiment, the record600 describes an attributes detected through the system 500.

In one embodiment, the areas of expertise field 610 includes informationrelated to the expertise of the user corresponding to the record 600.For example, the user may have designing web sites, programmingdatabases, building houses, and the like. In one embodiment, the areasof expertise for a user are determined through the content exchangedduring collaboration sessions and through titles of collaborationsessions participated in by the user.

In one embodiment, the collaboration frequency field 620 includesinformation related the frequency in which the user associated with therecord 600 participates in a collaboration session. For example, theuser may have attended a collaboration session with a frequency of fourtimes a week. Further, the collaboration frequency field 620 may alsonote a percentage of whether the user was an attendee or presenter ofthe collaboration session. In one embodiment, the interface module 510detects the collaboration sessions.

In one embodiment, the participant history field 630 includes theidentities of the participants of collaboration sessions including theuser associated with the record 600. In one embodiment, the participantrecognition module 570 detects the participants of the collaborationsessions.

In one embodiment, the collaboration history field 640 includesinformation related the prior collaboration sessions held in which theuser associated with the record 600 participated in. In one embodiment,the interface module 510 detects the collaboration sessions.

In one embodiment, the hierarchy field 650 includes information relatedto the profile's standing relative to other profiles. For example, theprofile associated with the record 600 may be related to other profilessimilar to a person being categorized within an organization chartwithin a company. In one instance, the profile associated with therecord 600 may manage 40 other people. Accordingly, the hierarchy field650 would reflect be associated with 40 other profiles in which thecurrent profile would have access to the other profiles.

In one embodiment, the hierarchy field 650 allows the selected profilesto be protected from view or access from other profiles depending on thehierarchy within the field 650. For example, a profile belonging to arank and file employee would not have access to sensitive informationwithin a profile belonging to a manager in one embodiment.

In one embodiment, the colleague field 660 includes information relatedfriends and colleagues of the user associated with the profile. In oneembodiment, the user associated with the record 600 is able to selectadditional profiles associated with users to be listed within thecolleague field 660.

In one embodiment, the applications field 670 includes informationrelated to the applications associated with the profile. In oneembodiment, the applications may be licensed applications associatedwith the profile. In another embodiment, the applications may beunlicensed applications that are being evaluated that are associatedwith the profile. In yet another embodiment, the applications within theapplications field 670 may be suggested and recommended to theassociated profile.

In another embodiment, the applications field 670 includes informationrelated to ratings of specific applications by the user of theapplication. For example, the user associated with the record 600 canprovide ratings for the application listed within the applications field670.

In another embodiment, the applications field 670 includes a library ofapplications for the record 600. In one embodiment, the library includesboth a corporate library and a personal library. In one embodiment, thecorporate library may include applications that are required by thecorporation or company that controls the user associated with the record600.

In one embodiment, the personal library includes applications that areselected by the user associated with the particular record 600. In oneinstance, the applications within the personal library are limited toonly a list of pre-approved applications. In another instance, theapplications within the personal library include any applications withthe exception of prohibited applications.

The flow diagrams as depicted in FIGS. 7, 8, 9, 10, 11, 12, 13, 14, and15 are one embodiment of the methods and apparatuses for selectivelyaccessing an application. The blocks within the flow diagrams can beperformed in a different sequence without departing from the spirit ofthe methods and apparatuses for selectively accessing an application.Further, blocks can be deleted, added, or combined without departingfrom the spirit of the methods and apparatuses for selectively accessingan application.

The flow diagram in FIG. 7 illustrates detecting activities during acollaboration session and refining the profiles of the participants ofthe collaboration session according to one embodiment of the invention.

In Block 705, a scheduled collaboration session is detected. In oneembodiment, the scheduled collaboration session corresponds to acollaboration session that is scheduled to occur in the future. In oneembodiment, the scheduled collaboration session includes identificationof the subject matter of the collaboration session and the participantsexpected to attend.

In Block 710, the subject matter of the scheduled collaboration sessionis detected. In one embodiment, the subject matter includes a titlegiven to the scheduled collaboration session. In another embodiment, thesubject matter includes an agenda or description of the scheduledcollaboration session.

In Block 715, the participants that are expected to attend the scheduledcollaboration session are detected. For example, participants may beinvited ahead of time for the scheduled collaboration session.

In Block 725, key words are extracted. In one embodiment, these keywords describe the essence of the scheduled collaboration session. Forexample, these key words may be utilized to describe the subject matterof the scheduled collaboration session. In one embodiment, the key wordsare derived from the subject matter that is detected within the Block710.

In Block 730, the key words from the Block 725 are compared with theprofiles associated with the participants identified within the Block715. In one embodiment, the profile of each participant includes an areaof expertise field 610 of a record 600 that describes areas of interestand knowledge that is associated with a corresponding user of theprofile. In one embodiment, the key words are compared with these areasof expertise identified within the field 610.

In Block 735, if there is a sufficient match between the profiles andthe key words, then the profiles of the participants that take part inthe scheduled collaboration session are updated in Block 740. In oneembodiment, the areas of expertise are strengthened and updated. Forexample, if the participant's profile does not indicate expertise inthis area, the key words are added to the participant's area ofexpertise field 610. Further, if the participant is already an expert inthis area, then the participant's expertise if further emphasized.

In one embodiment, the number of meetings field 620 may also beincreased based on the scheduled collaboration session. Further, theparticipant history field 630 and collaboration history field 640 canalso be updated.

In one embodiment, based on the participants that are part of thescheduled collaboration session, each of the profiles may be updated toreflect other participants within the colleagues 660 field. For example,each of the participants of the scheduled collaboration session willhave the other participants reflected within the colleagues 660 fieldbased on the scheduled collaboration session.

If there is not a sufficient match within the Block 735, then key wordscan be manually entered or confirmed by a participant of thecollaboration session in the Block 750. In one embodiment, the presenteror planner of the collaboration session confirms the key words for thecorresponding collaboration session.

In one embodiment, the sufficient match is determined by the similaritybetween the participant profiles and the extracted key words.

In Block 745, based on the key words and the participants of thescheduled collaboration session, an additional participant may besuggested. For example, based on the key words, another profilecorresponding to a potential participant may be identified through thearea of expertise field 610.

In one embodiment, selected profiles that are accessible and allowed tobe searched are considered. In one embodiment, the hierarchy field 650may be utilized to determine eligibility of the profile for searching.

The flow diagram in FIG. 8 illustrates detecting activities during acollaboration session and refining the profiles of the participants ofthe collaboration session according to one embodiment of the invention.

In Block 805, a collaboration session is detected. In one embodiment,the collaboration session corresponds to a collaboration session that iscurrently taking place. In one embodiment, the collaboration sessionincludes identification of the subject matter of the collaborationsession and the participants that are attending the collaborationsession.

In Block 810, the content being exchanged during the collaborationsession is detected. In one embodiment, the content is the audio contentexchanged during the collaboration session. In another embodiment, thecontent is the video content exchanged during the collaboration session.In yet another embodiment, the content is the textual or graphicalcontent exchanged during the collaboration session.

In Block 815, the participants that are attending the collaborationsession are detected. In one embodiment, different participants mayattend different portions of the collaboration session. Further, thedifferent participants are detected for the portions of thecollaboration that they attend.

In Block 820, the correct participants currently attending thecollaboration session is determined. For example, the listedparticipants for the collaboration session are checked against thecurrent participants of the collaboration session in one embodiment.

Further, based on the profiles of the participants that are attendingthe collaboration and the content of the collaboration session,additional participants that were not originally contemplated may bedesired. For example, if the collaboration session was originallycontemplated to cover a specific technical area of expertise and thefocus of the collaboration session shifts into another technical area,then other participants that have experience in this other technicalarea may benefit the collaboration session with their expertise.

In one embodiment, selected profiles that are accessible and allowed tobe searched are considered. In one embodiment, the hierarchy field 650may be utilized to determine eligibility of the profile for searching.

If additional participants are desired, then additional participants areinvited to the collaboration session in Block 825.

In Block 830, key words are extracted. In one embodiment, these keywords describe the essence of the collaboration session. For example,these key words may be utilized to describe the content of thecollaboration session. In one embodiment, the key words are derived fromthe content that is detected within the Block 805.

In Block 835, the profiles of the participants that take part in thecollaboration session are updated. In one embodiment, the areas ofexpertise are strengthened and updated. For example, if theparticipant's profile does not indicate expertise in this area, the keywords are added to the participant's area of expertise field 610.Further, if the participant is already an expert in this area, then theparticipant's expertise if further emphasized.

In one embodiment, the number of meetings field 620 may also beincreased based on participation in the collaboration session. Further,the participant history field 630 and collaboration history field 640can also be updated.

In one embodiment, based on the participants that are part of thecollaboration session, each of the profiles may be updated to reflectother participants within the colleagues 660 field. For example, each ofthe participants of the collaboration session will have the otherparticipants reflected within the colleagues 660 field based on thecollaboration session.

The flow diagram in FIG. 9 illustrates detecting activities during acollaboration session and identifying participants to join thecollaboration session according to one embodiment of the invention.

In Block 905, a collaboration session is detected. In one embodiment,the collaboration session corresponds to a collaboration session that iscurrently taking place. In one embodiment, the collaboration sessionincludes identification of the subject matter of the collaborationsession and the participants that are attending the collaborationsession.

In Block 910, the title corresponding to the collaboration session isdetected.

In Block 915, the participants that are attending the collaborationsession are detected. In one embodiment, different participants mayattend different portions of the collaboration session. Further, thedifferent participants are detected for the portions of thecollaboration that they attend.

In Block 920, a subset of available profiles is determined based on thetitle of the collaboration session. For example, if the title of thecollaboration session is “Caring For Your Teeth”, then the subset ofavailable profiles will include users that are related to dental caresuch as dentist, orthodontists, toothpaste vendors, toothbrush vendors,and the like.

In one embodiment, selected profiles that are accessible and allowed tobe searched are considered. In one embodiment, the hierarchy field 650may be utilized to determine eligibility of the profile for searching.

In Block 925, the content being exchanged during the collaborationsession is detected. In one embodiment, the content is the audio contentexchanged during the collaboration session. In another embodiment, thecontent is the video content exchanged during the collaboration session.In yet another embodiment, the content is the textual or graphicalcontent exchanged during the collaboration session.

In Block 930, if there is a request to include an expert to participatein the collaboration session, then in Block 935 a profile is identifiedfrom the subset of available profiles that are identified within theBlock 920. In one embodiment, the request to include an expert isinitiated by one of the participants of the collaboration session.

In one embodiment, the profile is identified based on the content asdetected in the Block 925. For example, if the content that is detectedin the Block 925 is related to “Deciding on What Type of Material to Usefor a Filling”, then a profile that is identified as the expert would bea dentist in one embodiment.

In Block 930, if there is no request to include an expert to participatein the collaboration session, then content is detected in Block 925

In Block 940, the user associated with the identified profile in theBlock 935 joins the collaboration session.

The flow diagram in FIG. 10 illustrates suggesting participants to jointhe collaboration session according to one embodiment of the invention.

In Block 1010, a title for the collaboration session is selected. In oneembodiment, the collaboration session corresponds to a collaborationsession that is currently taking place. In another embodiment, thecollaboration session corresponds to a scheduled collaboration sessionthat take place in the future.

In Block 1020, the title corresponding to the collaboration session isdetected.

In Block 1030, suggested participants for the collaboration session aredisplayed. In one embodiment, the profiles are searched based on thetitle of the collaboration session and the participant scheduling thecollaboration session.

In one embodiment, the possible profiles searched for the collaborationsession is limited to profiles that are accessible by the participantscheduling the collaboration session. In one instance, the participantscheduling the collaboration session has permission to access theprofiles. For example, if the participant scheduling the collaborationsession has permission to access a pool of profiles, then this pool ofprofiles will be searched as potential participants for thecollaboration session. In one embodiment, an organizational chart withina company is one example of a hierarchy that is utilized to determinewhether a participant has access to other profiles. For example,subordinates on an organizational chart may not have access tosuperiors. On the other hand, superiors on the organizational chart haveaccess to subordinate profiles. In another embodiment, a participant maybe given proxy access rights that place the participant either furtherup or further down in stature on the organizational chart.

In one embodiment, the profiles are selected based on the areas ofexpertise of each profile relative to the subject matter of thecollaboration session that is identified by the title.

In another instance, the profiles are selected based on the availabilityof the user associated with the profile. For example, if the status ofthe user is unavailable, then the particular profile will not beselected. However, if the status of the user is available as detectedthrough the corresponding profile, then the profile is eligible forselection.

In Block 1040, the participants are selected.

In Block 1050, additional suggested participants are displayed based onthe participants that were selected in the Block 1040. In oneembodiment, additional participants may be selected based on theparticipant history field 630, the collaboration history field 640, andcolleagues field 660 of the participants that are selected in the Block1040. For example, if participant A is selected in the Block 1040 andtypically participants in collaboration sessions with participant B, theparticipant B may be displayed as a suggested participant. Further, ifthe subject matter of the collaboration session as detected in the Block1020 matches the collaboration history field 640 of participant A tosuggest participant B, then the selection of participant B as asuggested participant is further strengthened.

The flow diagram in FIG. 11 illustrates suggesting participants to jointhe collaboration session according to one embodiment of the invention.

In Block 1110, a participant is selected for the collaboration session.In one embodiment, the collaboration session corresponds to acollaboration session that is currently taking place. In anotherembodiment, the collaboration session corresponds to a scheduledcollaboration session that take place in the future.

In Block 1120, the profile associated with the selected participantwithin the Block 1110 is detected. Further, additional profiles that arelisted within the profile associated with the selected participant arealso identified and suggested. In one embodiment, these additionalprofiles are discovered through the participant history field 630, thecollaboration history field 640, the hierarchy field 650, and/or thecolleagues field 660.

In Block 1130, suggested participants for the collaboration session aredisplayed.

In Block 1140, the participants are selected.

In Block 1150, additional suggested participants are displayed based onthe participants that were selected in the Block 1140. In oneembodiment, additional participants may be selected based on theparticipant history field 630, the collaboration history field 640, andcolleagues field 660 of the participants that are selected in the Block1140.

The flow diagram in FIG. 12 illustrates suggesting participants to jointhe collaboration session according to one embodiment of the invention.

In Block 1210, a subject is selected for the collaboration session. Inone embodiment, the collaboration session corresponds to a collaborationsession that is currently taking place. In another embodiment, thecollaboration session corresponds to a scheduled collaboration sessionthat take place in the future. In one embodiment, the subject may bereflected in the title assigned to the collaboration session. In anotherembodiment, the presenter of the collaboration session may explicitlystate the subject of the collaboration session.

In Block 1220, available participants are detected. In one embodiment,the possible profiles searched for the collaboration session is limitedto profiles that are accessible by the participant scheduling thecollaboration session. In one instance, the participant scheduling thecollaboration session has permission to access the profiles. Forexample, if the participant scheduling the collaboration session haspermission to access a pool of profiles, then this pool of profiles willbe searched as potential participants for the collaboration session.

In another embodiment, each of the participants associated with acorresponding profile is capable of choosing whether to allow theirrespective profile to be accessible to others.

In another example, the available of a profile belonging to aparticipant is restricted to profiles that are associated withparticipants affiliated with the same company.

In Block 1230, the available participants from the Block 1220 are rankedaccording to the subject matter of the collaboration session. Forexample, the available participants my have their areas of expertisefield 610, number of meetings field 620, participant history field 630,and/or collaboration history field 640 examined. Based on the profile,the participant is ranked according to how closely matched the profilerelates to the subject matter of the collaboration session.

In Block 1240, the highest ranked participants are selected anddisplayed. In one embodiment, a predetermined number of participants areselected. In another embodiment, a predetermined percentage of the totalnumber of possible participants is selected. In yet another embodiment,a predetermined scoring threshold is applied such that participants thatscore above the predetermined scoring threshold are selected.

In one embodiment, the methods and apparatuses for selectively accessingan application allows a profile to be searched wherein the profilebelongs to a user associated with a different company or a differentorganization within the same company. For example, the organizationalstructure that is searchable for a particular profile may includemultiple companies that are related through partnerships, affiliations,or client and customer relationships.

The flow diagram in FIG. 13 illustrates suggesting applications toparticipants within a collaboration session according to one embodimentof the invention.

In Block 1300, a collaboration session is detected. In one embodiment,the collaboration session corresponds to a collaboration session that iscurrently taking place.

In Block 1310, the subject matter, the content, and the participants ofthe collaboration session are detected. In one embodiment, the contentis the audio content exchanged during the collaboration session. Inanother embodiment, the content is the video content exchanged duringthe collaboration session. In yet another embodiment, the content is thetextual or graphical content exchanged during the collaboration session.

In one embodiment, the collaboration session includes identification ofthe subject matter of the collaboration session and the participantsthat are attending the collaboration session.

In one embodiment, different participants may attend different portionsof the collaboration session. Further, the different participants aredetected for the portions of the collaboration that they attend.

In Block 1320, the profiles associated with the participants aredetected. In one embodiment, a representative profile is shown as record600 in FIG. 6.

In Block 1330, an application associated with any of the participantsare detected. In one embodiment, the application is detected through alisting within the profile of the corresponding participant.

In Block 1340, additional applications are displayed for theparticipants. In one embodiment, the additional applications areselected based on the content and/or subject matter of the collaborationsession. For example, if the collaboration session includes sharing aspreadsheet, then a specialized application that is directed towards useof a spreadsheet may be displayed to the participants.

In another embodiment, the additional applications are selected based onthe current applications available to the participants. For example, ifa newer, updated version of an application already available to theparticipants is found, then this newer, updated version may be displayedto the participants. Further, exact duplicate applications that arealready being used within the collaboration session may be preventedfrom being displayed.

In yet another embodiment, the additional applications may also includeapplications available to the participants within the collaborationsession but are not being currently utilized. For example, if there is aspread sheet application available to the participants, a spread sheetis being shared within the collaboration session, this spreadsheetapplication is not currently being utilized, then this spread sheetapplication may be displayed to the participants to encourage use of theapplication by the participants.

In Block 1350, if one of the additional applications is not selected,then further applications may be displayed within the Block 1340.

If an additional application is selected, then the additionalapplication is initiated and the corresponding profile is updated withinBlock 1360. In one embodiment, the profile of the participant is updatedwith the additional application depending on ownership of the additionalapplication. For example, if all the participants of the collaborationsession are authorized to utilize the additional application at a futuretime, the profiles of all the participants may be modified to reflectthe additional application. Similarly, if selected participants of thecollaboration session are authorized to utilize the additionalapplication at a future time, the profiles of the selected participantsmay be modified to reflect the additional application.

The flow diagram in FIG. 14 illustrates accessing applications accordingto one embodiment of the invention.

In Block 1400, a request for use of an application is detected. In oneembodiment, the request for use of the application comes from a userthat is not part of a collaboration session. In another embodiment, therequest for use of the application comes from a user that is aparticipant of a collaboration session.

In Block 1410, the profile associated with the requester is detected. Inone embodiment, a representative profile is shown as record 600 in FIG.6.

In Block 1420, the permission to utilize the requested application isdetected. In one embodiment, the profile of the requester includesinformation indicating permission to utilize the requested application.For example, if the requested application requires a license in order toutilize the requested application, then a corresponding license for therequested application is detected. In another example, the requester mayneed verification that permission is granted for the requester toutilize the requested application from the requester's organization. Inother embodiments, other factors such as the hierarchical position ofthe requester within the requester's organization, the number ofparticipants collaborating with the requested application, and the likeare utilized to determine whether permission is granted to utilized therequested application.

If there is permission to access the requested application in Block1430, then the use of the requested application is initiated for therequester within the Block 1470.

In one embodiment, permission to access the requested application isdetermined based on the hierarchy of the profile associated with therequester. For example, if the requester has obtained a sufficientlyhigh hierarchical categorization within the particular organization,then access to the application may be automatically granted.

In another embodiment, permission to access the requested application isdetermined based on the number of participants that are currentlyattending a collaboration session. For example, if there are enoughparticipants attending the collaboration session that wherein one of theparticipants is the requester, then access to the application may beautomatically granted.

If there is no permission to access the requested application in theBlock 1430, then permission to access the application is requested inBlock 1440. In one embodiment, the request for permission includes apurchase request for the requested application. In another embodiment,the request for permission includes requesting access by the requesterto utilize the requested application. For example, the organization thatthe requester is associated with may require permission for any of itsmembers to gain access to other applications.

In one embodiment, permission to purchase the requested application isdetermined based on the hierarchy of the profile associated with therequester. For example, if the requester has obtained a sufficientlyhigh hierarchical categorization within the particular organization,then authorization to purchase the application may be automaticallygranted.

If access is to the requested application is granted to the requester inthe Block 1440, then the requester is authorized to access the requestedapplication and the requester's profile is also updated in Block 1460.In one embodiment, the requester's profile is updated if the requestedapplication is purchased to reflect permission to utilize the requestedapplication in the future. In another embodiment, the requester'sprofile is updated if the requester's organization wishes to allowfuture access to the requested application; the requester's profile isupdated to reflect use of the requested application by the requester inthe future. In yet another embodiment, the requester's profile isupdated if the requester's organization does not wish to allow futureaccess to the requested application; the requester's profile is updatedto reflect denial of use of the requested application by the requesterin the future.

After Block 1460, the requested application is initiated for therequester.

If access is to the requested application is denied to the requester inthe Block 1440, then the requester is denied access to the requestedapplication in Block 1450.

After the Blocks 1450 and 1470, additional requests are detected withinthe Block 1400.

The flow diagram in FIG. 15 illustrates accessing applications accordingto one embodiment of the invention.

In Block 1500, a request for installation of an application is detected.In one embodiment, the request for installation of the application comesfrom a user that is not part of a collaboration session. In anotherembodiment, the request for use of the application comes from a userthat is a participant of a collaboration session.

In Block 1510, the profile associated with the requester is detected. Inone embodiment, a representative profile is shown as record 600 in FIG.6.

In Block 1520, the permission to install the requested application isdetected. In one embodiment, the profile of the requester includesinformation indicating permission to install the requested application.For example, the requested application may already be pre-installedwithin the corporate library; the application is on a prohibitedapplication list; or the application is on an approved application list.

If there is permission to install the requested application in Block1530, then the installation of the requested application is initiatedfor the requester within the Block 1540.

In one embodiment, permission to install the requested application isdetermined based on the permissions of the requested application withinthe profile associated with the requester.

If there is no permission to install the requested application in theBlock 1530, then the requester is denied installation of the requestedapplication in Block 1570.

In Block 1550, a recommendation of the requested application may besubmitted by the requester. In one embodiment, the recommendation servesas a rating of the requested application that can be shared with otherusers.

In Block 1560, the requester's profile is updated to reflect theinstallation of the requested application and any recommendations. Inone embodiment, the requester's profile is updated if the requestedapplication is purchased to reflect permission to utilize the requestedapplication in the future. In another embodiment, the requester'sprofile is updated if the requester's organization wishes to allowfuture access to the requested application; the requester's profile isupdated to reflect use of the requested application by the requester inthe future. In yet another embodiment, the requester's profile isupdated if the requester's organization does not wish to allow futureaccess to the requested application; the requester's profile is updatedto reflect denial of use of the requested application by the requesterin the future.

After the Blocks 1560 and 1570, additional requests are detected withinthe Block 1500.

The foregoing descriptions of specific embodiments of the invention havebeen presented for purposes of illustration and description. Theinvention may be applied to a variety of other applications.

They are not intended to be exhaustive or to limit the invention to theprecise embodiments disclosed, and naturally many modifications andvariations are possible in light of the above teaching. The embodimentswere chosen and described in order to explain the principles of theinvention and its practical application, to thereby enable othersskilled in the art to best utilize the invention and various embodimentswith various modifications as are suited to the particular usecontemplated. It is intended that the scope of the invention be definedby the Claims appended hereto and their equivalents.

1. A method comprising: requesting an application; detecting a userrequesting the application; detecting a profile associated with theuser; and granting permission to access the application based on anaccess parameter.
 2. The method according to claim 1 further comprisingstoring the permission and associated reference to the applicationwithin a record that corresponds to the profile.
 3. The method accordingto claim 1 wherein the access parameter is a free license to utilize theapplication.
 4. The method according to claim 1 wherein the accessparameter is a paid license to utilize the application.
 5. The methodaccording to claim 1 wherein the access parameter corresponds with ahierarchical position of the requester on an organization chart.
 6. Themethod according to claim 1 wherein the access parameter correspondswith a number of participants within a collaboration session wherein thecollaboration session includes the requester.
 7. The method according toclaim 1 further comprising purchasing the application by the requester.8. The method according to claim 7 further comprising updating theprofile of the requester based on purchasing the application.
 9. Themethod according to claim 7 wherein purchasing the application is basedon a hierarchy of the requester.
 10. The method according to claim 1sharing the application with another participant.
 11. A system,comprising: a storage module configured to store a record containing apermission status associated with an application; an application managermodule configured to control distribution of the application to arequester based on the permission status; and a controller moduleconfigured to update the permission status within the record.
 12. Thesystem according to claim 11 wherein storage module is configured tostore the permission status with the record.
 13. The system according toclaim 11 wherein the application manager module is further configured tomodify the permission status to allow use of the application by therequester.
 14. The system according to claim 13 wherein the applicationmanager module is configured to allow the requester to purchase alicense to the application.
 15. The system according to claim 14 whereinthe requester purchases the license based on a hierarchy of therequester.
 16. The system according to claim 11 wherein the applicationmanager module is configured to allow another participant to utilize theapplication.
 17. A system comprising: means for requesting anapplication; means for detecting a user requesting the application;means for detecting a profile associated with the user; and means forgranting permission to access the application based on an accessparameter.
 18. The system according to claim 18 wherein the means forgranting permission includes allowing the user to access theapplication.
 19. The system according to claim 18 wherein the means forgranting permission includes allowing another participant to access theapplication.