Downloadable control policies for instant messaging usage

ABSTRACT

An instant message enabled device and method are provided. The method may include accessing at least one control policy for usage of an instant messaging (IM) service using an IM enabled client device. The method may also include installing data related to the at least one control policy at the IM enabled client device to modify functionality of the IM enabled client device to comply with the at least one control policy.

CROSS REFERENCE TO RELATED APPLICATIONS

The present application claims priority from and is a continuation ofU.S. patent application Ser. No. 10/662,890 filed on Sep. 15, 2003 andentitled “Downloadable Control Policies for Instant Messaging Usage,”the contents of which are expressly incorporated herein by reference intheir entirety.

FIELD OF THE DISCLOSURE

The present disclosure relates to methods and systems for instantmessaging (IM).

DESCRIPTION OF THE RELATED ART

Current instant messaging (IM) systems offer limited mechanisms forparental control of a child's IM usage. Some specialized IM devices aretied to a wireless base station that controls access to the Internet.The wireless base station plugs into a host personal computer (PC) thatmust be powered for the IM devices to access the Internet. Parentsdeploy the wireless base station and the host PC to enable IM usage athome for their children. The parents set up IM preferences using thehost PC, which in turn dictates when the IM devices can access theInternet, with whom users of the IM devices can chat, and which chatrooms can be accessed using the IM devices.

Using specialized IM devices as described above has its shortcomings.Each user is restricted to using a particular IM device for IMapplications. Further, security holes result from tying theadministration of control policies to the wireless base station. If anend user takes his/her IM device to another location having another basestation and another host PC, usage of the IM device is dictated by adifferent set of IM preferences which may be less restrictive than thepreferences stated in the host PC at home.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is pointed out with particularity in the appendedclaims. However, other features are described in the following detaileddescription in conjunction with the accompanying drawing in which:

FIG. 1 is a flow chart of an embodiment of a method of controlling IMusage;

FIG. 2 is a schematic, block diagram of an embodiment of a system tocontrol IM usage; and

FIG. 3 is a block diagram of a basic data model for the IM subscriberprofile database.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Embodiments of the present invention are described with reference toFIG. 1, which is a flow chart of an embodiment of a method ofcontrolling IM usage, and FIG. 2, which is a schematic, block diagram ofan embodiment of a system to control IM usage.

As indicated by block 10, the method comprises receiving a request froma user 12 to sign up for an IM service on behalf of a minor 14.Typically, the user 12 is a parent or guardian of a child (e.g. a son ora daughter) who is the minor 14. The user 12 makes the request using aclient device 16. Examples of the client device 16 include, but are notlimited to, a personal computer (PC), a personal digital assistant(PDA), and a wireless telephone. The request is received by an IMregistration server 20 via a computer network such as the Internet 22.

As indicated by block 24, the method comprises receiving one or moreauthentication credentials to establish the age of the user 12. In oneembodiment, the age of the user 12 is received via the Internet 22 froma third-party identity service 26 that can vouchsafe therefor. Anexample of the third-party identity service 26 to which the user 12 hassubscribed is provided by Liberty Alliance™. Other ways of establishingthe age of the user 12 are based on a driver's license number for theuser 12, and whether or not the user 12 has possession of a valid creditcard, for example.

As indicated by block 30, the method comprises proceeding with the signup process if the age of the user 12 is at or above a particularthreshold T. The threshold T may be 18 years old or 21 years old, forexample. If the age of the user 12 cannot be established, or if the user12 is not old enough to proceed, a termination message indicating sameis provided to the user 12, as indicated by block 32.

As indicated by block 34, the method comprises providing a Web-basedprofile administrator interface to the user 12. To provide the profileadministrator interface, the IM service registration server 20 outputs acomputer data signal, such as a signal in a markup language, using acommunication protocol. Examples of the markup language include, but arenot limited to, hypertext markup language (HTML) and wireless markuplanguage (WML). Examples of the protocol include, but are not limitedto, hypertext transfer protocol (HTTP) and wireless access protocol(WAP). The computer data signal is communicated to the client device 16via the Internet 22.

The client device 16 displays the profile administrator interface basedon the computer data signal. Using the profile administrator interfacewith the client device 16, the user 12 creates a profile for the minor14. The profile corresponds to an IM handle for the minor 14. Theprofile can include any combination of the following control policies:(a) times of day, such as hours, when the minor 14 can access theInternet 22 for instant messaging or chat; (b) black lists of otherusers of the IM service that cannot be reached by the minor 14; (c)white lists of other users of the IM service with which the minor 14 canexclusively communicate; (d) preferred lists of chat rooms that theminor 14 is able to join or not able to join; and (e) parentalcontrol-based ratings of chat rooms that the minor 14 can join (e.g.only PG-13 or under chat rooms). The profile can include time-basedcontrols such as: (a) specific times when the minor 14 can or cannot usehis/her client device 36; (b) specific times when the minor 14 can logon or cannot log on (e.g. he/she cannot log on during exams in school);(c) specific times when messages from buddies are to be blocked; and (d)specific times when messages from anyone not in the buddy list will beblocked or allowed. In general, any of the aforementioned policies canapplied to the minor 14 and/or his/her particular client device 36.

As indicated by block 38, the method comprises receiving the profile forthe minor 14 as created by the user 12. The profile is received by theIM service registration server 20 from the client device 16 via theInternet 22. The IM service registration server 20 stores the profile inan IM subscriber profile database 40. The IM subscriber profile database40 stores profiles for a plurality of IM subscribers. The IM subscriberprofile database 40 is depicted to illustrate various time-based controlpolicies included in the various profiles for different IM subscribers.Each of the subscribers may use any combination of one or more of thetime-based control policies.

After the profile is created and stored, the IM service is enabled forthe minor 14. As indicated by block 42, the method comprises receiving arequest from the minor 14 to log on to the IM service. The minor 14makes the request using either the client device 36 or another clientdevice. Examples of the client devices include, but are not limited to,a PC 44, a PDA 46, a wireless telephone 50 that supports downloadableapplications, and a specialized IM device 52. The PC 44 may access theInternet 22 by a digital subscriber line (DSL) 54 or another connection.The PDA 46 may access the Internet 22 by a wireless access point (WAP)56, such as an 802.11-based or WI-FL WAP. The wireless telephone 50 mayaccess the Internet 22 by a wireless telephone network 60, such as acellular telephone network, via General Packet Radio Service (GPRS) oranother third generation (3G) medium, or a Short Message Service (SMS).The profile of the minor 14 may be tied to the wireless telephone 50 bya license/user identification combination. The specialized IM device 52may access the Internet 22 by a base station 62, as described herein,using a standard protocol such as 802.11. Regardless of the specifictype of client device used by the minor 14, the request is received byan IM server 64 via the Internet 22.

As indicated by block 70, the method comprises providing, limiting orinhibiting the IM service to the minor 14 in accordance with theuser-created profile. These acts may comprise any combination of:inhibiting communication between the minor 14 and those users on theblack lists; enabling communication exclusively with those users on thewhite lists; enabling the minor 14 to join chat rooms on the preferredlist; inhibiting the minor 14 to join chat rooms not on the preferredlist; enabling the minor 14 to join chat rooms based on their ratings;and inhibiting the minor 14 to join chat rooms based on their ratings.These acts may further comprise any combination of: enabling use of theclient device 36 during specific allowed times indicated in the profile;inhibiting use of the client device 36 outside of the specific allowedtimes or during specific black-out times indicated in the profile;enabling the minor 14 to log on during specific allowed times;inhibiting the minor 14 to log on outside of the allowed times or duringspecific black-out times; blocking messages from buddies during specificblack-out times or outside of specific allowed times; and blockingmessages from anyone not in the buddy list during specific black-outtimes or outside of specific allowed times. The times are localized to asubscriber's time zone. Each of the time intervals can be specified aseither recurring or a one-time occurrence.

Preferably, the IM server 64 communicates profile information to theclient device 36. Based on the profile information, the client device 36modifies its functionality to comply with the policies. Regardless ofthe specific type of client device 36, plug-in software components canbe used to add the parental control functionality to standard IMclients. Examples of IM clients include, but are not limited to, YAHOO!™Messenger, AIM™, MSN™ messenger, GAIM™ and JABBER™.

In this way, the policies stored by the IM subscriber profile database40 are downloaded to the client device 36. A policy engine 71, such asthe aforementioned plug-in, running on the client device 36 performs theactual task of verifying all access to ensure compliance with thepolicies. The policy engine 71 filters incoming and outgoing messages toother IM users or groups based on the policies. The policy engine 71also may act to send alerts, in the form of e-mails or instant messages,to the parent or guardian user 12 to alert him/her of the activity ofthe client device 36. In general, the policy engine 71 acts to provide,limit and/or inhibit use of the IM service on the client device 36.

For client devices that cannot be extended, such as an SMS-basedtelephone, the policy engine may reside at a proxy server rather than atthe client devices themselves.

The policy engine 71 may periodically update usage data stored by eitherthe IM server 64 or the IM subscriber profile database 40. In this case,the IM server 64 periodically receives usage data from the client device36. The usage data may comprise a log of actions taken to ensurecompliance with the policies.

Alternatively, the IM server 64 can act to provide, limit and/or inhibitthe IM service based on the profile stored in the IM subscriber profiledatabase 40. In this alternative, the IM server 64 monitors the minor's14 usage of the IM service, and stores associated information that canbe subsequently viewed by the user 12. However, use of the policy engine71 makes the whole system more scaleable to a large number of users thana completely centralized model where servers filter through eachincoming/outgoing message to any policy-controlled client device.

Either way, the policy engine 71 of the client device 36 and/or the IMserver 64 ensure that the IM service is provided to the minor 14 incompliance with the policies established by the user 12.

As indicated by block 72, the method comprises receiving a request fromthe user 12 to view the usage information associated with the minor 14.The request is received by the IM service registration server 20 fromthe client device 16 via the Internet 22.

As indicated by block 74, the method comprises receiving one or moreauthentication credentials to establish the age of the user 12. This actis similar to the act performed in block 24. The age of the user 12 canbe established via the Internet 22 using the third-party identityservice 26 that can vouchsafe therefor. Other ways of establishing theage of the user 12 are based on a driver's license number for the user12, and whether or not the user 12 has possession of a valid creditcard, for example.

As indicated by block 76, the method comprises proceeding with the usageinformation process if the age of the user 12 is at or above aparticular threshold T. The threshold T may be 18 years old or 21 yearsold, for example. If the age of the user 12 cannot be established, or ifthe user 12 is not old enough to proceed, a termination messageindicating same is provided to the user 12, as indicated by block 78.

It is noted that identity-based authorization may be substituted forage-based authorization to determine whether the user 12 can proceed tothe profile administrator interface. In this case, based on theidentity-based authorization, the system may assert that the user 12 isindeed the parent or guardian of the minor 14. As a result, other adultswho are not the parent or guardian of the minor 14 would not be able toauthorize use of the client device 36 and/or IM client software by theminor 14.

As indicated by block 80, the method comprises providing the profileadministrator interface to the client device 16 of the user. The profileadministrator interface displays the various profile information andusage information for the minor 14. Examples of the information include,but are not limited to, buddy lists and chat room history.

The system and method proposed herein allow the minor 14 to use an IMclient (which is hardware-based and/or software-based) over many typesof networks having connectivity to the Internet 22. The minor's 14 usageis governed by a set of rules specified in a profile associated with theminor 14 and his/her client device 36. The profile is stored in the IMnetwork. The minor 14 is allowed to use the IM service in multiplelocations in accordance with the rules specified by the user 12.

For example, consider the user 12 being a parent who sets up a profilefor his daughter, the minor 14, to enable her to access anInternet-based service. Whenever the daughter logs into the serviceafter connecting to the Internet, the IM client would receive theprofile and modify its functionality to comply with the profile rules.Thus, the daughter would be able to use an IM device in her home using aWI-FI network, and at a public library that provides WI-FL connectivity,both with the same set of preferences and policies set by the parent.

FIG. 3 is a block diagram of a basic data model for the IM subscriberprofile database 40. The data comprise subscriber time usage data 100,subscriber data 102, subscriber list data 104, subscriber list detaildata 106, subscriber for device data 110, device data 112, chat roomlist data 114, rating data 116, chat room data 120, list time usage data122, policy data 124, action list data 126, action log data 130 anddevice time usage data 132.

The subscriber data 102 has a subscriber identifier as a primary key, asubscriber license number, a name, a screen name, a rating identifier asa first foreign key, an identifier of the guardian of the subscriber asa second foreign key, and an indication of whether the subscriber is anadministrator. In an example data set wherein the subscriber identifieridentifies the minor 14, the subscriber is indicated not to be anadministrator. In an example data set wherein the subscriber identifieridentifies the user 12, the subscriber is indicated to be anadministrator.

The subscriber time usage data 100 comprises the subscriber identifieras a primary key and a foreign key, a time period identifier as aprimary key, a start time and an end time to define the time period, andan indication if use is allowed or disallowed in the time period.

The subscriber list data 104 comprises a list identifier as a primarykey, the subscriber identifier as a foreign key, and an indication ifthe list is a white list.

The subscriber list detail data 106 comprises the list identifier as aprimary key and a foreign key, and member data as a foreign key. Themember data identifies members of the list identified by the listidentifier.

The list time usage data 122 comprises the list identifier as a primarykey and a foreign key, a time period identifier as a primary key, astart time and an end time to define the time period, and an indicationif use is allowed or disallowed in the time period.

The subscriber for device data 110 comprises the subscriber identifieras a primary key and a foreign key, and a device identifier as a primarykey and a foreign key. In an example data set wherein the subscriberidentifier identifies the minor, the device identifier may identify theclient device 36.

The device data 112 comprises the device identifier as a primary key anda model number. For example, the model number may comprise a modelnumber of the client device 36.

The device time usage data 132 comprises a time period identifier as aprimary key, the device identifier as a primary key and a foreign key, astart time and an end time to define the time period, and an indicationif use is allowed or disallowed in the time period.

The chat room list data 114 comprises a personalized list identifier asa primary key, the subscriber identifier as a primary key and a foreignkey, a chat room identifier as a foreign key, and an indication if thechat room list is a white list.

The rating data 116 comprises the rating identifier as a primary key, adescription and a rating display.

The chat room data 120 comprises the chat room identifier as a primary.key, a description, and the rating identifier as a foreign key.

The policy data 124 comprises the subscriber identifier as a primary keyand a foreign key, a policy identifier as a primary key, an action typeas a foreign key, and a custom policy property. The policy data 124defines the policies that are to be enforced, such as by the policyengine 71 of the client device 36.

The action list data 126 comprises the action type as a primary key andan action description. The action list data 126 is a catalog of types ofpredetermined actions that can be performed by the client device 36based on events. For example, an action may comprise “send e-mail toadministrator when a message is blocked” or “send IM to administratorwhen the subscriber logs on to the service”.

The action log data 130 comprises the subscriber identifier as a primarykey and a foreign key, an action identifier as a primary key, the actiontype as a foreign key, an indicator of whether or not the action iscompleted, a time that the action was completed, and an action result.Actions taken in accordance with the policies are logged in the actionlog data 130. The action log data 130 may be periodically updated basedupon data received from the policy engine 71 of the client device 36 bythe IM server 64.

Those having ordinary skill will recognize that the herein-disclosedcomputer-implemented acts can be directed by computer-readable programcode stored by a computer-readable medium. Examples of thecomputer-readable medium include, but are not limited to, a magneticmedium such as a hard disk or a floppy disk, an optical medium such asan optical disk (e.g. a CD or a DVD), or an electronic medium such as anelectronic memory (e.g. a computer's internal memory or a removablememory such as a memory card). The IM service registration server 20 andthe IM server 64 comprise a computer to perform the computer-implementacts.

It will be apparent to those skilled in the art that the disclosedinventions may be modified in numerous ways and may assume manyembodiments other than the preferred forms specifically set out anddescribed herein.

The above disclosed subject matter is to be considered illustrative, andnot restrictive, and the appended claims are intended to cover all suchmodifications, enhancements, and other embodiments which fall within thetrue spirit and scope of the present invention. Thus, to the maximumextent allowed by law, the scope of the present invention is to bedetermined by the broadest permissible interpretation of the followingclaims and their equivalents, and shall not be restricted or limited bythe foregoing detailed description.

1. A method comprising: accessing at least one control policy for usageof an instant messaging (IM) service using an IM enabled client device;and installing data related to the at least one control policy at the IMenabled client device to modify functionality of the IM enabled clientdevice to comply with the at least one control policy.
 2. The method ofclaim 1, wherein the data related to the at least one control policycomprises a plug-in.
 3. The method of claim 1, wherein the at least onecontrol policy is stored at an IM server by a first person as part ofsetting up an account for a second person.
 4. The method of claim 3,wherein the second person is a minor and the first person is a guardianof the minor.
 5. The method of claim 1, wherein the data related to theat least one control policy is installed as part of a login process ofthe IM service.
 6. The method of claim 1, wherein the IM enabled clientdevice comprises a policy engine to modify functionality of the IMenabled client device to comply with the at least one control policy. 7.The method of claim 1, wherein the at least one control policy comprisesa limitation on usage of the IM service for a minor.
 8. The method ofclaim 1, further comprising: receiving an instant message from the IMservice at the IM enabled client device; and displaying the instantmessage at the IM enabled client device in accordance with the at leastone control policy.
 9. The method of claim 1, further comprising:receiving an instant message from the IM service at the IM enabledclient device; and blocking the instant message at the IM enabled clientdevice in accordance with the at least one control policy.
 10. Themethod of claim 1, wherein the at least one control policy indicates atleast one time when a received message is to be blocked or allowed. 11.The method of claim 1, further comprising generating a record of actionstaken by the IM enabled client device to comply with the at least onecontrol policy.
 12. The method of claim 1, further comprising sending anactivity log from the IM enabled client device to the IM service.
 13. Aninstant messaging (IM) enabled device comprising: an IM application tointeract with an IM service; a memory to store at least one controlpolicy related to the IM service; and a policy engine to limit usage ofthe IM service based on the at least one control policy.
 14. The deviceof claim 13, further comprising a user interface to receive the at leastone control policy and to send the at least one control policy to the IMservice.
 15. The device of claim 13, wherein the at least one controlpolicy includes a restriction on when the device can be used.
 16. Thedevice of claim 13, wherein the memory stores a record of actions takenat the device.
 17. The device of claim 13, wherein at least one alert issent based on an action taken at the device.
 18. The device of claim 13,wherein the at least one alert is sent to another device.
 19. A computerreadable medium comprising computer readable instructions, wherein thecomputer readable instructions are executable by a computer to: accessat least one control policy for usage of an instant messaging (IM)service using an IM enabled client device; and install data related tothe at least one control policy at the IM enabled client device tomodify functionality of the IM enabled client device to comply with theat least one control policy.
 20. The computer readable medium of claim19, further comprising instructions to receive an instant message fromthe IM service and to display the instant message at the IM enabledclient device in accordance with the at least one control policy.