Enhanced buddy list using mobile device identifiers

ABSTRACT

A graphical user interface on a display device of a computer enables communications using a computer service. The graphical user interface includes a list of potential message recipients selected by a user as significant to the user. The graphical user interface also includes a mobile device identifier associated with one or more of the listed potential message recipients and a user account identifier associated with one or more of the listed potential message recipients. At least one of the listed potential recipients includes a mobile device identifier as the only available conduit for data delivery to the potential message recipient using the computer service.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No. 13/442,226 filed on Apr. 9, 2012, which is a continuation of U.S. application Ser. No. 12/548,338 filed on Aug. 26, 2009 and now U.S. Pat. No. 8,156,193, which is a continuation of U.S. application Ser. No. 10/895,421, filed Jul. 21, 2004, and titled “Enhanced Buddy List Using Mobile Device Identifiers,” which claims the benefit of U.S. Provisional Application No. 60/488,376, filed Jul. 21, 2003, and titled “Client Software Enabling Communications Between A Client Computer and Internet Service Provider Host Computers,” and U.S. Provisional Application No. 60/488,749, filed Jul. 22, 2003, and titled “Client Software Enabling Communications Between a Client Computer and Internet Service Provider Host Computers—#2,” and is a continuation-in-part of U.S. application Ser. No. 10/723,040, filed Nov. 26, 2003, and titled “Electronic Message Forwarding,” and U.S. application Ser. No. 10/715,213, filed Nov. 18, 2003 and titled “Account Linking” which claims the benefit of U.S. Provisional Application No. 60/426,806, filed Nov. 18, 2002, and titled “Software Enabling and Enhancing Communications and Functionality At A Client Computer,” U.S. Provisional Application No. 60/427,566, filed Nov. 20, 2002, and titled “IM Account Linking and Shadow Mail,” and claims the benefit of U.S. Provisional Application No. 60/456,963, filed Mar. 25, 2003, and titled “Account Linking.” All of the previous applications are incorporated herein by reference.

TECHNICAL FIELD

This description relates to communicating using an instant messaging system.

BACKGROUND

Users of an instant messaging service can communicate virtually in real time with other instant messaging users. Users may manually create a buddy list of user names of other users of the instant messaging service, and may establish instant messaging sessions with those other members using the buddy list.

Many people have multiple instant messaging accounts that they use for different identities or personalities. Conventionally, people only appeared online with one account at a time, unless multiple instant messaging clients were run. Therefore, only the buddy list corresponding to the account that was used to sign into the instant messaging system was shown. Similarly, messages could only be sent to and from the account that was used to sign in. shown. Similarly, messages could only be sent to and from the account that was used to sign in.

DESCRIPTION OF DRAWINGS

FIG. 1 is a block diagram of a communications system.

FIGS. 2 and 3 are expansions of the block diagram of FIG. 1.

FIGS. 4A-4C, 5A and 11 are illustrations of exemplary interfaces for showing buddy lists for multiple linked instant messaging accounts.

FIG. 5B is an illustration of an exemplary interface for managing multiple linked accounts.

FIGS. 6A-6D are illustrations of an exemplary interface for linking and unlinking accounts.

FIG. 7 is a flow chart of an exemplary process for linking accounts.

FIGS. 8A and 8B are diagrams of exemplary relationships between linked accounts.

FIGS. 9A and 9B are illustrations of exemplary interfaces for signing into an instant messaging system with a linked account.

FIG. 10 is a flow chart of an exemplary process for logging into an instant messaging system.

FIGS. 12A-12D and 13A-13C are illustrations of an exemplary interface for sending communications to and from a linked account.

FIGS. 14A and 14B are flow charts of exemplary processes for communicating from a linked account.

FIG. 15 is a flow chart of an exemplary process for forwarding instant messages to a client.

FIG. 16A is an illustration of an exemplary notification that a specified action has been performed by a buddy of one of the linked accounts.

FIG. 16B is an illustration of an exemplary interface for specifying actions.

FIG. 17 is a block diagram of a communications system.

FIGS. 18A-18D are illustrations of exemplary interfaces for managing and showing buddy lists for mobile telephone identities.

FIGS. 19 and 21 are diagrams for processes for communicating between a client system and a mobile telephone.

FIG. 20 is a diagram of an exemplary data structure for message session information.

FIGS. 22 and 23 are illustrations of exemplary messages that may be sent between a Client system and a mobile telephone.

Like reference symbols in the various drawings may indicate like elements.

DETAILED DESCRIPTION

A buddy list is a user-definable list of other co-users (i.e., buddies) of an online or network communications systems that enables the user to perceive presence information and changes for the co-users in a unique graphical user interface (GUI) and to track changes to presence status for the co-users in substantially real-time automatically, where presence indicates the status of the co-user with respect to the online or network communications system. The buddy list also provides the user with a mechanism to initiate communications (e.g., instant messages (IMs), electronic mail (e-mail), chat, and other communications) with the co-users. A user may create separate buddy lists of co-users, either with intersecting or disjoint lists of users, and label these buddy lists according to the user's preferences or otherwise.

Each user account may have one or more buddy lists. When a user logs on to a system, the user's set of buddy lists is presented to a buddy list system. The buddy list system attempts to match co-users currently logged into the system with the entries on the user's buddy list. Any matches are displayed to the user. As co-users logon and logoff, a user's buddy list is updated to reflect these changes. An indication also may be added to show that a co-user just Jogged on or logged off the system.

In one exemplary implementation, a user may identify a mobile telephone number to be added to the user's buddy list. The mobile telephone number also may be assigned a surrogate identifier or alias (e.g., a name) to be displayed on the user's buddy list to help the user identify the identity associated with the mobile telephone number. A user may address an instant message to the mobile telephone number added to the buddy list in lieu of addressing an instant message to a screen name.

In another exemplary implementation, a user may link multiple accounts that are held by the user for use in a communications system, such as an instant messaging system. Each of the multiple accounts held by the same user may be identified by a different unique identifier (e.g., a screen name, a number, a user identity, or other alphanumeric string). By logging into one of the linked accounts, the linked accounts all may appear to be logged into the communications system simultaneously. The user can send and receive communications from each linked account all while appearing to other users as the particular identity that the user is known to by others. As a result, the user appears to be online more often and has the potential to receive more communications.

A primary account is chosen by the user to sign in to the communications system. After the primary account is authenticated, a single GUI shows a buddy list, or a list containing the users of the communications system with which communications regularly occur, for the primary account and each of the linked accounts. Thus, by signing onto a single account, the user's other linked accounts also may be started. The GUI may separate the buddy lists for the multiple linked accounts. In one implementation to be described with respect to FIGS. 4A and 4B, only the buddy lists for one of the linked accounts is shown at a time with the buddy lists from other accounts hidden or minimized. In another implementation to be described with respect to FIG. 4C, more than one of the buddy lists from the linked accounts may be simultaneously displayed to the user. The user may make modifications to the buddy list when it is displayed. The GUI also contain an element for accessing a control panel through which the accounts to be linked can be specified. The control panel allows the user to add an account to be linked by enabling the entry of authentication information for the account to be linked.

After authentication, communications to and from the account to be linked may occur. A communication interface enables the specification of a linked account from which the communications are sent to a recipient of the communications. If the communications with the recipient from the selected linked account are allowed to occur, the communications are sent. Also, communications directed to any of the linked accounts may be received and made perceivable to the user. When a message is received, the account to which the message was sent is determined, and the response to the message is configured to automatically send from that account. Notifications of the status of users listed on the buddy lists for the linked accounts are also presented. The notifications specify the account whose buddy list contains the user whose status merited notification.

For illustrative purposes, FIGS. 1-3 show an example of a communications system for implementing techniques for transferring electronic data. For brevity, several elements in the figures described below are represented as monolithic entities. However, as would be understood by one skilled in the art, these elements each may include numerous interconnected computers and components designed to perform a set of specified operations and/or may be dedicated to a particular geographical region.

Referring to FIG. 1, a communications system 100 is capable of delivering and exchanging data between a requestor system 105 and a provider system 110 through a communications link 115. The requestor system 105 may include a client system and the provider system 110 may include a host system. The requestor system 105 typically includes one or more requestor devices 120 and/or requestor controllers 125, and the provider system 110 typically includes one or more provider devices 135 and/or provider controllers 140. For example, the requestor system 105 or the provider system 110 may include one or more general-purpose computers (e.g., personal computers), one or more special-purpose computers (e.g., devices specifically programmed to communicate with each other and/or the requestor system 105 or the provider system 110), or a combination of one or more general-purpose computers and one or more special-purpose computers. The requestor system 105 and the provider system 110 may be arranged to operate within or in concert with one or more other systems, such as, for example, one or more Local Area Networks (“LANs”) and/or one or more'Wide Area Networks (“WANs”).

The provider system 110 may include a communication interface such as an electronic mail gateway. For instance, the provider system 110 may include a dedicated mailing system that is implemented by specialized hardware or executed by a general purpose processor capable of running various applications, such as electronic mailer programs, and capable of employing various file transfer protocols, such as the Simple Mail Transfer Protocol (“SMTP”). The communications interface of provider system 110 enables communications between the provider system 110 and other systems through, for example, communications link 115.

The requestor device 120 (or the provider device 135) is generally capable of executing instructions under the command of a requestor controller 125 (or a provider controller 140). The requestor device 120 (or the provider device 135) is connected to the requestor controller 125 (or the provider controller 140) by a wired or wireless data pathway 130 or 145 capable of delivering data.

The requestor device 120, the requestor controller 125, the provider device 135, and the provider controller 140 each typically include one or more hardware components and/or software components. An example of a requestor device 120 or a provider device 135 is a general-purpose computer (e.g., a personal computer) capable of responding to and executing instructions in a defined manner. Other examples include a special-purpose computer, a workstation, a server, a device, a component, other physical or virtual equipment or some combination thereof capable of responding to and executing instructions. The requestor device 120 and the provider device 135 may include devices that are capable of peer-to-peer communications.

An example of a requestor controller 125 or a provider controller 140 is a software application loaded on the requestor device 120 or the provider device 135 for commanding and directing communications enabled by the requestor device 120 or the provider device 135. Other examples include a program, a piece of code, an instruction, a device, a computer, a computer system, or a combination thereof, for independently or collectively instructing the requestor device 120 or the provider device 135 to interact and operate as described. The requestor controller 125 and the provider controller 140 may be embodied permanently or temporarily in any type of machine, component, physical or virtual equipment, storage medium, or propagated signal capable of providing instructions to the requestor device 120 or the provider device 135.

The communications link 115 typically includes a delivery network 160 making a direct or indirect communication between the requestor system 105 and the provider system 110, irrespective of physical separation. Examples of a delivery network 160 include the Internet, the World Wide Web, WANs, LANs, analog or digital wired and wireless telephone networks (e.g., PSTN, ISDN, and xDSL), radio, television, cable, satellite, and/or any other delivery mechanism for carrying data. The communications link 115 may include communication pathways 150 and 155 that enable communications through the one or more delivery networks 160 described above. Each of the communication pathways 150 and 155 may include, for example, a wired, wireless, cable or satellite communication pathway.

An electronic information store 180 may be connected to the provider system 110, included as a component of the provider system 110, and/or connected to the delivery network 160. The electronic information store 180 may be a repository for electronic information that may be in an indexed and/or searchable format. For example, in one implementation, the electronic information store 180 may be used to store information related to the relationships between the linked accounts of the communications system 100.

FIG. 2 illustrates a communications system 200 including a requestor system 205 communicating with a provider system 210 through a communications link 215. Requestor system 205 typically includes one or more requestor devices 220 and one or more requestor controllers 225 for controlling the requestor devices 220. Provider system 210 typically includes one or more provider devices 235 and one or more provider controllers 240 for controlling the provider devices 235. The communications link 215 may include communication pathways 250 and 255 that enable communications through the one or more delivery networks 260.

Examples of each element within the communications system of FIG. 2 are broadly described above with respect to FIG. 1. In particular, the provider system 210 and communications link 215 typically have attributes comparable to those described with respect to the provider system 110 and the communications link 115 of FIG. 1. Likewise, the requester system 205 of FIG. 2 typically has attributes comparable to and illustrates one possible implementation oldie requestor system 105 of FIG. 1.

The requestor device 220 typically includes a general-purpose computer 270 having an internal or external storage 272 for storing data and programs such as an operating system 274 (e.g., DOS, Windows™, Windows 95™, Windows 98™, Windows 2000™. Windows Me™, Windows XP™, Windows NT™, OS/2, or Linux) and one or more application programs. Examples of application programs include authoring applications 276 (e.g., word processing programs, database programs, spreadsheet programs, or graphics programs) capable of generating documents or other electronic content; client applications 278 (e.g., stand alone e-mail client or AOL client, CompuServe client, AIM client, AOL TV client, or ISP client, all of which may include a built-in or embedded e-mail or instant messaging client) capable of communicating with other computer users, accessing various computer resources, and viewing, creating, or otherwise manipulating electronic content; and browser applications 280 (e.g., Netscape's Navigator or Microsoft's Internet Explorer) capable of rendering standard Internet content and also capable of supporting a web-based e-mail client and a web-based instant messaging client.

The general-purpose computer 270 also includes a central processing unit 282 (CPU) for executing instructions in response to commands from the requestor controller 225. In one implementation, the requestor controller 225 includes one or more of the application programs installed on the internal or external storage 272 of the general-purpose computer 270. In another implementation, the requester controller 225 includes application programs stored in and performed by one or more device(s) external to the general-purpose computer 270.

The general-purpose computer also includes a communication device 284 for sending and receiving data. One example of the communication device 284 is a modern. Other examples include a transceiver, a set-top box, a communication card, a satellite dish, an antenna, or another network adapter capable of transmitting and receiving data over the communications link 215 through a wired or wireless data pathway 250. The general-purpose computer 270 also may include a TV tuner 286 for receiving television programming in the form of broadcast, satellite, and/or cable TV signals. As a result, the requestor device 220 can selectively and/or simultaneously display network content received by communications device 284 and television programming content received by the TV tuner 286.

The general-purpose computer 270 typically includes an input/output interface 288 for wired or wireless connection to various peripheral devices 290. Examples of peripheral devices 290 include, but are not limited to, a mouse 291, a mobile phone 292, a personal digital assistant 293 (PDA), a MP3 player (not shown), a keyboard 294, a display monitor 295 with or without a touch screen input, a TV remote control 296 for receiving information from and rendering information to subscribers, and an audiovisual input device 298.

Although FIG. 2 illustrates devices such as a mobile telephone 292, a PDA 293, and a TV remote control 296 as being peripheral with respect to the general-purpose computer 270, in another implementation, such devices may themselves include the functionality of the general-purpose computer 270 and operate as the requester device 220. For example, the mobile phone 292 or the PDA 293 may include computing and networking capabilities and function as a requester device 220 by accessing the delivery network 260 and communicating with the provider system 210. Furthermore, the requester system 205 may include one, some or all of the components and devices described above.

FIG. 3 illustrates a communications system 300 that includes a requester system 305 communicating with a provider system 310 through a communications link 315. The communications link 315 may include communications pathways 350 and 355 that enable communications through one or more delivery networks 360. Examples of the elements within the communications system 300 are broadly described above with respect to FIGS. 1 and 2. In particular, the requester system 305 and the communications link 315 typically have attributes comparable to those described with respect to the requester system 105 and 205 and the communications links 115 and 215 of FIGS. 1 and 2. Likewise, the provider system 310 of FIG. 3 typically has attributes comparable to and illustrates one possible implementation of the provider system 110 and 210 of FIGS. 1 and 2.

The provider system 310 includes a gateway server 370, an administrative (“admin”) server 372, an authentication server 374, an authentication database 376, an account linking server 378, an account linking database 380, and an instant messaging server 382.

The gateway server 370 communicates with the requester system 305 over the delivery network 360 through a web server 384 regarding account linking and unlinking actions. In one implementation, the gateway server 370 receives account linking and unlinking requests and forwards them to the admin server 372.

The admin server 372 acts as a clearinghouse for the account linking information management and linked account validation functions. The admin server 372 manages the account linking information and profiles in association with each screen name. The admin server 372 is configured to process requests received from the gateway 370 and saves linking information from successful processes in the account linking database 380 through the account linking server 378. Linking information from unsuccessful processes typically is not stored or saved. The admin server 372 typically is configured to communicate a response message to the requester system 305 through the gateway server 370, web server 384, and delivery network 360.

The authentication server 374 is configured to process and to validate account authentication requests from the admin server 372 against the authentication database 376 and any partner database system 386. Once accounts have been validated, the admin server may be configured to update that information in the account linking database 389 through the account linking server 378. Accounts may be authenticated and validated on different basis including the presence of a correct account name and password. For validated accounts, account attributes may be forwarded from the authentication database 376 through the authentication server 374 for further use, processing, and/or storage by the admin server 372. For accounts that are not maintained by the provider system 310, the authentication server 374 is configured to communicate the authentication requests to an appropriate partner database system 386 for authentication and validation.

The account linking server 378 interacts with the account linking database 380, which stores and maintains user buddy list and account linking information. The account linking server 378 is configured to manage the information flow to and from the account linking database 380. The type of information contained in the account linking database 380 may include, but is not limited to, users settings of account linking information. The account linking information may be organized in different manners. In one exemplary implementation, the account linking information is organized by screen name in other implementations. The account linking information may be organized by guid, a unique identifier used in the Open Name Space.

Other types of information contained in the account linking database 380 may include a list of alias screen names linked by a particular screen name, linking attributes associated with each screen name (e.g., timestamp for which an alias account whose password was last changed at the time when the link is created and default visibility/presence preferences), and linking profile information (e.g., revalidation information and linking account order).

The instant messaging server 382 is configured to process communications sent to and received by users of the communications system. The instant messaging server 382 interacts with the account linking database 380 through the account linking server 378 and also interacts with the admin server 372 to request and receive authentication information using the authentication server 374 and the authentication database 376. Once a user of the requester system 305 has been authenticated and the user's different accounts have been linked and the user has been signed-on to the linked accounts, the user may send and receive communications by interacting with the instant messaging server 382 using the delivery network 360.

An account is needed to use the communications systems 100, 200, and 300. Each account typically has at least one associated screen name. The screen name is the identifier of the account that is authenticated by a client of the communications system. Communications sent throughout the communications system are addressed by the screen names of the intended recipient accounts.

When a first account is linked to a second account, the first account may be called an alias of the second account. In one implementation, either account may be used to sign on to the communications system initially and then any other linked accounts may be signed on to the communications system automatically. In one exemplary implementation, the aliases of a primary account are signed on to the communications system when the main account is signed on to the communications system. The aliases can send and receive communications in the same way as the primary account. Through a single client program and a single, common GUI, communications can be sent substantially simultaneously to and from the primary account and the aliases of the primary account.

Preferences for the each of the accounts may be set on an individual account basis or on a global basis by setting the preferences in one account and applying them globally in other linked accounts. In one exemplary implementation, certain preferences, including away messages and privacy settings, may be set by each of the aliases. All other preferences for the alias accounts may be set to be the same as the preferences for the primary account.

Accounts from multiple communications systems may be linked together. For example, accounts from America Online (AOL), America Online Instant Messenger (AIM), and ICQ may be linked together so that communications may be sent over multiple communications systems using only one client program. In addition, accounts from partner domains may be linked. For example, accounts of an online gaming club may communicate using the AIM communications system; and the accounts from the gaming club may be linked to AIM accounts such that communications may be sent and received by gaming club accounts while not signed into the gaining club on a gaming device. Similarly, accounts from a dating service that use the AIM communications system may be linked to other accounts such that the members of the dating service can communicate with their dating service accounts while not logged in to the dating service. The architecture described in FIG. 3 is one possible implementation of a communications system, and other implementations for sending communications are possible.

Referring to FIG. 4A, a buddy list interface 400 displays huddy lists for all linked accounts. In one exemplary implementation only one account's buddy lists 402 a are shown at a time. The buddy lists 402 a includes one or more screen names 404 a. For example, the buddy lists 402 a include the screen name 404 a, BHeikes8. The screen names 404 a are used to address communications to and from the specified accounts. The screen names 404 a may be separated into one or more groups 406 a. The groups 406 a are listed with a name, a number of people from the group that are currently logged in to the communications system, and the total number of people in the group. For example, group 406 a is named AIM, and seven out of the eleven members of the group are logged in to the communications system.

The buddy list interface 400 includes tabs 408 a-408 e that can be used to access the buddy lists for the various linked accounts. There is one tab 408 a-408 e for each of the linked accounts. For example, tab 408 a is for an account named AIMUIUser, tab 408 b is for an account named AOLMember, tab 408 c is for an account named AIMUser, tab 408 d is for an account named AIMUser2, and tab 408 e is for an account named PersonalsUser@love.com, an account from a partner domain. The buddy lists for an account is displayed when the tab for that account is selected. For example, the buddy list 402 a is displayed because the tab 408 c for the account named AIMUser has been selected. Referring also to FIG. 4B, selecting the tab 408 a for the account named AIMUIUser displays the buddy lists 402 b from for that account. The buddy lists 402 b includes multiple screen names, including screen name 404 b for BerndEw, and groups, including group 406 b named Co-Workers, which has two out of six members logged in.

A setup button 410 allows for configuration of the currently displayed buddy list. Selecting the setup button 410 enables the addition and deletion of screen names, such as screen names 404 a and 404 b, and groups, such as groups 406 a and 406 b, to the buddy list 402 that is currently displayed. In one implementation, adding a screen name to a buddy list of a linked account causes the screen name to be added to the buddy lists of the other linked accounts. After selecting a screen name 404 from the buddy list, selecting an IM button 412 displays an interface for communicating with the account corresponding to the selected screen name. In one implementation, the user may be given an option to add one or more linked accounts.

Referring to FIG. 4C, an alternative implementation of the buddy list interface 400 displays buddy lists for all linked accounts simultaneously. The buddy list interface 400 includes a buddy list 402 a for an account with a screen name AIMUIUser and a buddy list 402 b for an account with a screen name AIMUser. The buddy list 402 a for the account with the screen name AIMUIUser is displayed first because that account was' used to sign in to the communications system. The buddy lists 402 a and 402 b include one or more screen names 404 a and 404 b. For example, the buddy list 402 a includes the screen name 404 a, Alexis 101, and the buddy list 402 b includes the screen name 404 b, Bheikes8. The buddy lists 402 a and 402 b also may be separated into one or more groups 406 a. The groups 406 a are listed with a name, a number of people from the group that are currently logged in to the communications system, and the total number of people in the group. For example, group 406 a is named Buddies, and two out of the thirteen members of the group are logged in to the communications system, while group 406 b is named AIM, and seven out of the eleven members of the group are logged in to the communications system.

A setup button 410 allows for configuration of the displayed buddy lists. Selecting the setup button 410 enables the addition and deletion of screen names, such as screen names 404 a and 404 b, and groups, such as groups 406 a and 406 b, to the buddy lists 402 a and 402 b that are displayed. In one implementation, adding a screen name to a buddy list of a linked account causes the screen name to be added to the buddy lists of the other linked accounts. After selecting a screen name 404 from one of the displayed buddy lists 402 a and 402 b, selecting an IM button 412 displays an interface for communicating with the account corresponding to the selected screen name.

Referring to FIG. 5A, the buddy list interface 400 includes a menu bar 502 that includes an option 504 labeled “My AIM.” Selecting the option 504 creates a submenu 506. The submenu 506 includes an account linking option 508, labeled “Link Accounts.” Selecting the account linking option 508 displays an account linking control panel 500 from FIG. 5B. The account linking control panel 500 enables the specification of the accounts to be linked as well as various preference settings related to the linked accounts. For example, selecting a linking button 510 enables the specification of the accounts to be linked. For each linked account, multiple preference settings related to account visibility and away message are presented on the account linking control panel 500. Presence information for an invisible account may not be seen by other users of the communications system. Therefore, if a linked account is set to be invisible, then other users of the communications system are unable to see that the account is logged into the system even though the account, and other accounts that are linked to the account, are logged into the system. For example, selecting checkbox 512 a will cause the account named LinkedScreenName4 to appear invisible to other users of the communications system Likewise, selecting checkbox 512 b will cause the account named LinkedScreenName5 to appear invisible, and selecting checkbox 514 c will cause the account named LinkedScreenName6 to appear invisible.

The account linking control panel 500 also enables the specification of an away message for each of the linked accounts. The away message is displayed when an account is logged into but not actively using the communications system. Each away message has a name for quick reference, as well as text that is displayed to the other users of the communications system. For each linked account, an away message can be chosen and modified using the account linking control panel 500. For example, selection box 514 a enables the selection of an away message for the account named LinkedScreenName4. The text of the selected away message appears in a text box 516 a, where the text may be modified. Similarly, an away message for the account named LinkedScreenName5 may be selected using the selection box 514 b, and the text of selected away message may be modified in a text box 516 b. Finally, an away message for the account named LinkedScreenName6 may be selected using the selection box 514 c, and the text of the selected away message may be modified in a text box 516 c.

In other implementation's, preferences related to outgoing self-expressions, buddy icons, a block list, a warn list, a buddy list, certificates, privacy, and profiles may be set for each linked account suing the account linking control panel 500. In addition, any preference for the screen name used to sign in to the instant messaging system may be set with the account linking control panel 500. Other preferences for each of the linked accounts are determined by the setting of the account used to sign in to the instant messaging system. These preferences include presence, idle time, incoming expression settings, typing indicator, time stamp, and font.

A number of accounts less than the total number of linked accounts may be displayed on the account linking control panel at a time. A back button 518 and a next button 520 enable moving between different subsets of the set of linked accounts such that the preferences for the linked accounts in the various subsets may be specified. Any changes made to the invisibility and away message preferences may be immediately applied to the current session with the communications system using an apply button 522. Similarly, any changes that have been made may be discarded by selecting a cancel button 516524 When all desired changes have been made, the account linking control panel 500 may be closed by selecting a done button 526.

If no accounts have been linked together, then the accqunt linking control panel includes only the linking button 510. The other elements for setting the visibility and away messages for the linked accounts are not presented on the account linking control panel 500.

Referring to FIG. 6A, an account linking interface 600 enables the linking of an account to other linked accounts. The accounts that have been linked together are listed on the account linking interface 600. For example, eight accounts named ScreenName1 through ScrenName8 have been linked using the account linking interface 600. Selecting an add button 602 allows for more accounts to be added to the set of linked accounts.

Next to each account listed in the account linking interface 600 is a checkbox that can be used to select the corresponding account. For example, a checkbox 604 a is associated with an account named ScreenName1, a checkbox 604 b is associated with an account named ScreenName2, a checkbox 604 c is associated with an account named ScreenName3, a checkbox 604 d is associated with an account named ScreenName4, a checkbox 604 e is associated with an account named ScreenName5, a checkbox 6041 is associated with an account named ScreenName6, a checkbox 604 g is associated with an account named ScreenName7, and a checkbox 60411 is associated with an account named ScreenName8. An unlink button 606 enables the breaking of links from the accounts that have been selected using the checkboxes 604 a-604 h. For example, selecting the checkbox 604 a for the account named ScreenName1 and subsequently selecting the unlink button 606 would break the link between the account named ScreenName1 and the other linked accounts. An optional confirmation may be presented to verify that the selected screen names should be unlinked.

When no accounts have been linked together, only the add button 602 is shown on the account linking interface 600. The list of linked accounts, the checkboxes 604 a-604 h, and the unlink button 606 are not included in the account linking interface 600.

Referring to FIG. 6B, the account linking interface enables the entry of authentication information for an account after the add button 602 has been selected. The screen name of the account to be linked may be entered in a name text field 608, while the password for the account to be linked may be entered in a password text field 610. After the authentication information has been entered in the name text field 608 and the password text field 610, selecting a save button 612 verifies the entered authentication information and creates a link to the other linked accounts. A cancel button 614 may be selected to dismiss the account linking interface 600 without linking any more accounts. After the cancel button 614 is selected, the list of linked accounts shown in FIG. 6A is presented to the user.

In the event that the entered authentication information is incorrect, a notification will be presented, and the authentication information may be entered again. If additional authentication information, such as a SecureID code, is needed to authenticate the account, a means for entering the additional information is presented.

Referring to FIG. 6C, after successful authentication of the account to be linked and creation of a link between the existing linked accounts and the newly linked account, the user is notified of the number of accounts that still may be linked to the existing set of linked accounts, if such a limit exists. A yes button 616 and a no button 618 enable the user to decide if more accounts are to be linked to the set of linked accounts. If the yes button 616 is selected, the name text field 608 and the password text field 610 are presented again to allow the user to enter authentication information for the additional account to be linked. If the no button 618 is selected, the list of linked accounts is displayed. The yes button 616 and the no button 618 are only presented if the limit on the number of linked accounts has not been reached. If the limit has been reached, then the user is presented with a message saying that the limit has been reached and that no more accounts may be linked. A single confirmation button dismisses the message and displays the list of linked accounts when selected.

Referring to FIG. 6D, in one implementation, the account linking interface 600 may suggest a set of accounts to be linked, thus simplifying the account linking process. The accounts may be suggested based on the structure of the accounts for the communications system. For example, a hierarchy may exist where a set of accounts are subordinate to a master account. In such a case, the account linking interface 600 may suggest that the subordinate accounts be linked to the master account. For example, the account linking interface 600 may suggest that eight accounts named ScreenName1 through ScrenName8 be linked together. Next to each account listed in the account linking interface 600 is a checkbox that can be used to select the corresponding account. For example, a checkbox 620 a is associated with an account named ScreenName1, a checkbox 620 b is associated with an account named ScreenName2, a checkbox 620 c is associated with an account named ScreenName3, a checkbox 620 d is associated with an account named ScreenName4, checkbox 620 e is associated with an account named ScreenName5, a checkbox 620 f is associated with an account named ScreenName6, a checkbox 620 g is associated with an account named ScreenName7, and a checkbox 620 h is associated with an account named ScreenName8. A link button 622 enables the creation of links between the accounts that have been selected using the checkboxes 620 a-620 h and the account for which the account linking interface 600 is displayed. For example, selecting the checkbox 604 a for the account named ScreenName1 and subsequently selecting the link button 622 would create a link between the account named ScreenName1 and the account for which the account linking interface 600 is displayed. An optional confirmation may be presented to verify that the selected screen names should be linked. Referring to FIG. 7, a process 700 is used to link multiple accounts such that communications may be sent simultaneously from the linked accounts. The process 700 begins when a main account is used to log into a communications system (702). The account linking control panel is accessed so that other accounts may be linked to the main account used to sign in to the communications system (704). The button on the account linking control panel for linking an account is selected (706), and the authentication information for the account to be linked is entered (708). In one implementation, the authentication information for the account to be linked may be known already by the main account. For example, an account hierarchy may exist where authentication information may be known by a master account for all of the accounts subordinate to the master account. The account to be linked may subordinate to the main account, so the authentication information for the account to be linked may be known already by the main account. In such an implementation, the account information for the account to be linked does not need to be entered. If the authentication information is Correct, then the account is linked to the accounts that have been previously linked. If more accounts are to be linked (710), the button for linking an account is selected (706), and the authentication information for the account to be linked is entered (708). In this manner, the authentication information is sequentially entered and verified for all of the accounts to be linked.

After all of the accounts to be linked have been entered (710), a list of linked accounts is presented. If any accounts are to be unlinked from the rest of the linked accounts; then they are selected from the list (712). The unlink button is pressed to break the links between the selected accounts and the other accounts that remain linked (714).

Referring to FIGS. 8A and 8B, seven accounts 802-814 have been linked together using different relationships between pairs of directly linked accounts. The type of relationship used to directly link a pair of accounts determines whether a different pair of accounts may be indirectly linked. For example, a bi-directional link exists between the accounts in FIG. 8A. A bi-directional link is a two-may link such that linking a first account to a second account means that the second account also is linked to the first account. Therefore, two relationships are created with a single link.

Specifically, in FIG. 8A, bi-directional links exist between different accounts, and SN1 is linked to SN2, SN3, SN4, and SN5. Thus, when. SN1 is used to sign in to the communications system, SN2, SN3, SN4, and SN5 appear as aliases of SN1. SN2 is linked to SN1 and SN7, which appear as aliases of SN2 when SN2 is used to sign in to the communications system. SN3 is linked to SN1, which appears as an alias of SN3 when SN3 is used to sign in to the communications system. Similarly, SN4 is linked to SN1, which appears as an alias of SN4 when SN4 is used to sign in to the communications system, and SN5 also is linked to SN1, and SN1 appears as an alias of SN5 when SN5 is used to sign in to the communications system. SN6 is linked to SN7, which appears as an alias of SN6 when SN6 is used to sign in to the communications system. Finally, SN7 is linked to SN2 and SN6, which appear as aliases of SN7 when SN7 is used to sign in to the communications system.

In FIG. 8B, one-way linking is used between accounts, so a reflexive relationship does not necessarily exist between two linked accounts. For two accounts to appear linked to one another, each account has to create a link to the other account. Specifically, in the example, SN1 is linked to SN3, SN4, and SN5, which appear as aliases of SN1 when SN1 is used to sign in to the communications system. SN2 is linked to SN1, and SN1 appears as an alias of SN2 when SN2 is used to sign in to the communications system. SN3, SN4, and SN5 are not linked to any other accounts and do not have any aliases. SN6 is linked to SN7, so SN7 appears as an alias of SN6 when SN6 is used to sign in to the communications system. SN7 is linked to SN2, which appears as an alias of SN7 when SN7 is used to sign in to the communications system.

The description provided above with respect to FIGS. 8A and 8B is premised on the accounts 802-814 being linked using a star linking scheme, which dictates that a direct link must exist between two accounts before the accounts are linked. On the other hand, two accounts may appear to be linked even though a direct link between the two accounts does not exist. This linking scheme, called mesh linking, calls two accounts linked if there is an indirect link between the two accounts. For example, in FIG. 8B, SN2 and SN4 may be called linked under a mesh linking scheme because they are indirectly linked through SN1. In general, two accounts may be called linked in a mesh-linking scheme if there exists a path of linked accounts between the two accounts.

Referring to FIG. 9A, a sign in interface 900 allows the user to enter the authentication information needed to log in to the communications system with a primary account. The screen name of the primary account may be selected from a selection box 902. Alternatively or additionally, the screen name of the primary account may be typed in the selection box 902. The password for the primary account may be entered in the text box 904. If the checkbox 906 is selected, then the password for the account listed in the selection box 902 is automatically entered in the text box 904 from memory. Selecting a checkbox 908 will cause the primary account to appear as invisible, which prevents other users of the communications system from detecting the presence of the primary account even though the primary account is logged in to the communications system. After the necessary authentication information has been entered, a sign on button 910 is selected. After selecting the sign on button 910, the authentication information entered on the sign on interface 900 is verified. If additional authentication information, such as a SecureID code, is needed, a means for entering the additional information is presented. If the information is successfully verified, then the buddy list interface 400 is shown for the primary account and all of the linked accounts.

Referring to FIG. 98, a dialog box 912 may be presented after verification of the authentication information and before the buddy list interface 400 is displayed. The dialog box 912 informs the user that a link to an alias account has been broken because the password for the alias account has changed. The option to relink the alias account to the primary account is given. A relink button 914 is enables the reestablishment of the link. Selecting the relink button 914 displays the account linking interface 600, and the new password for the alias account may be entered. After successful authentication of the new password, the link between the primary account and the alias account is reestablished, and the dialog box 912 is dismissed. In one implementation, the user may be presented with a separate form or a text box within dialog box 912 to enter a new password for revalidation of a broken link.

A cancel button 916 dismisses the dialog box 912 without reestablishing the broken link. The link between the primary account and the alias account remains broken. A dialog box 912 may be presented for each link from the primary account to an alias account that has been broken. After all of the broken links have been reestablished or dismissed, and the buddy list interface 400 is presented.

In another implementation, the link between the primary account and the alias account may be maintained despite a change in the password for the alias account. In such an implementation, the dialog box 912 is not presented, and the link to the alias account does not need to be reestablished.

Links between accounts also may be broken manually. From the perspective of a single user with multiple linked accounts, the user may break any link between the linked accounts regardless of the linked account used to sign in to the communications system and regardless of whether the link is bi-directional. Authentication information for the accounts connected by the link to be broken may be entered in order to authorize the destruction of the link. Similarly, from the perspective of multiple users with multiple linked accounts, a link between an account to which the link extends and an account from which the link extends may be broken by the user corresponding to the account to which the link extends. A notification may be sent to the account from which the link extends, and the permission of the account from which the link extends may be required for destruction of the link.

Referring to FIG. 10, a process 1000 is used to sign in to a communications system with multiple linked accounts. The process 1000 begins when authentication information for a primary account for signing in to the communications system is entered and verified (1.002). The visibility of the primary account is checked (1004). If the primary account is to be visible, then the presence of the primary account is announced to the other accounts that currently are logged in to the communications system (1006). If broken links from the primary account are detected, then the links may be repaired to reestablish a connection between the primary account and an alias account (1008).

Next, a set of accounts that are linked to the primary account, including those accounts that had a broken link repaired, is accessed (1010). One of the linked accounts from the set of linked accounts is chosen (1012). The chosen linked account is authenticated based on authentication information stored with respect to the primary account (1014). After authentication, the visibility of the linked account is checked (1016). If the linked account is to appear visible, then the presence of the linked account is announced to the other accounts that currently are logged in to the communications system (1018).

A determination is made as to whether more accounts to be linked exist in the set of linked accounts (1020). If more accounts do exist, a linked account is chosen (1012), the linked account is authenticated (1014), the visibility of the linked account is checked (1016), and the presence of the linked account is announced if the linked account is to be visible (1018). In this manner, the accounts that are linked to the primary account are signed in to the communications system sequentially. Once all of the linked accounts have been signed in to the communications system (1020), a buddy list interface displaying the buddy lists for the primary account and the linked accounts is displayed (1022). Communication can then occur using the primary account and the linked accounts.

Referring to FIG. 11, a buddy list interface 400 a has been displayed for a user of a communications system with linked accounts. The user has two linked accounts, one with a screen name of AIMUIUser, and one with a screen name of AIMUser. The buddy list interface 400 a includes a buddy list 402 a for the account with screen name AIMUIUser and a buddy list 402 b for the account with the screen name AIMUser. The buddy list 402 a is displayed first because the screen name AIMUIUser was used to sign in to the communications system. In addition, two other users, a user with a screen name OtherUser1 and a user with a screen name OtherUser2 are logged in to the communications system, and the corresponding buddy list interfaces 400 b and 400 c, respectively, are displayed. OtherUrer1 and OtherUser2 do not maintain any linked accounts, so the buddy list interfaces 400 b and 400 c each only display a single buddy list 402 c and 402 d, respectively. The buddy list 402 c for OtherUser1 includes the screen name AIMUIUser, which indicates that the account with the screen name AIMUIUser is logged in to the communications system. The buddy list 402 d for OtherUser2 includes the screen name AIMUIUser, which indicates that the account with the screen name AIMUser is logged in to the communications system. Even though the account with the screen name AIMUser did not directly log in to the communications system, the account is still shown as logged in because the account is linked to the account with the screen name AIMUIUser, which was used to log in to the communications system.

Referring to FIG. 12A, communications may be sent to and from the linked accounts using a communications interface 1200. The communications interface 1200 includes a recipient indicator 1202 that indicates a recipient of the messages sent with the communications interface 1200 and a sender indicator 1204 that indicates a sender of the messages sent with the communications interface 1200. For example, the communications interface 1200 is used to send communications from the screen name OtherUser1 to the screen name AIMUIUser. The communications interface 1200 is seen by the user with the screen name OtherUser1 as the user sends messages to the screen name AIMUIUser. The screen name OtherUser1 may send messages to the screen name AIMUIUser after seeing the screen name AIMUIUser on the buddy list interface 400 b from FIG. 11. The screen name AIMUIUser appeared on the buddy list interface 400 b from FIG. 11 because the account with the screen name AIMUIUser logged directly in to the communications system.

A message transcript text box 1206 displays the text of the messages sent between the sender and the recipient. Further messages may be specified in a message text box 1208. Once specified in the message text box 1208, the message may be sent by selecting a send button 1210.

Referring to FIG. 12B, a different communications interface 1200 is displayed for the user with the screen name AIMUIUser after a message is sent from the user with the screen name OtherUser1. The communications interface 1200 is used by the user with the screen name AIMUIUser to send a response to the user with the screen name OtherUser1. The recipient indicator 1202 indicates that the screen name OtherUser1 is the recipient of messages sent with the communications interface 1200. Similarly, the sender indicator 1204 indicates that the screen name AIMUIUser is the sender of messages sent with the communications interface 1200. A message transcript text box 1206 displays the text of the messages sent between the sender and the recipient, including the original message sent from the screen name OtherUser1 to the screen name AIMUIUser. Further messages may be specified in a message text box 1208. Once specified in the message text box 1208, the message may be sent by selecting a send button 1210. Messages may be sent from the account with the screen name AIMUIUser because the account with the screen name AIMUIUser was used to log directly in to the communications system.

Referring to FIG. 12C, a communications interface 1200 may be displayed for the user with a screen name OtherUser2. The communications interface 1200 is used to send communications from the screen name OtherUser2 to the screen name AIMUser. The communications interface 1200 is seen by the user with the screen name OtherUser2 as the user sends messages to the screen name AIMUser. The screen name OtherUser2 may send messages to the screen name AIMUser after seeing the screen name AIMUser on the buddy list interface 400 c from FIG. 11. The screen name AIMUser appeared on the buddy list interface 400 c from FIG. 11 because the account with the screen name AIMUser is linked to the account with the screen name AIMUIUser, which was used to log directly in to the communications system.

A message transcript text box 1206 displays the text of the messages sent between the sender and the recipient. Further messages may be specified in a message text box 1208. Once specified in the message text box 1208, the message may be sent by selecting a send button 1210.

Referring to FIG. 12D, a different communications interface 1200 is displayed for the user with the screen name AIMUser after a message is sent from the user with the screen name OtherUser2. The user with the screen name AIMUser is the same as the user with the screen name AIMUIUser because the corresponding accounts are linked. The communications interface 1200 is used by the user with the screen name AIMUIUser or AIMUser to send a response to the user with the screen name OtherUser2. The recipient indicator 1202 indicates that the screen name OtherUser2 is the recipient of messages sent with the communications interface 1200. Similarly, the sender indicator 1204 indicates that the screen name AIMUser is the sender of messages sent with the communications interface. 1200. A message transcript text box 1206 displays the text of the messages sent between the sender and the recipient, including the original message sent from the screen name OtherUser2 to the screen name AIMUser. Further messages may be specified in a message text box 1208. Once specified in the message text box 1208, the message may be sent by selecting a send button 1210. Messages may be sent from the account with the screen name AIMUser because the account with the screen name AIMUser is linked to the account with the screen name AIMUIUser, which was used to log directly in to the communications system. Furthermore, the user with the screen names AIMUIUser and AIMUser may transparently send messages using the communications interface 1200 from two linked accounts simultaneously.

Referring to FIG. 13A, a communication interface 1200 has a different appearance before a first message is sent. The communication interface 1200 includes a sender selection box 1302 in which the account that the communication is sent from is specified. All communications sent using the communication interface 1200 appear to be from the account selected in the sender selection box 1302. For example, the account with the screen name AIMUIUser has been selected as the sender of the communication, and all communications will appear to be from that account. The screen names of all the linked accounts are presented in and may be selected from the sender selection box 1302. An expanded sender selection box 1304 includes the names of all of the linked accounts from which the communication interface 1200 may be sent. The expanded sender selection box 1304 may be displayed below the sender selection box 1302 when the arrow on the right side of the sender selection box 1302 is selected. The expanded sender selection box 1304 also may be displayed below the sender selection box 1302 when attempting to scroll through the selections included in the sender selection box 1304.

The recipient of the communication is specified using the recipient selection box 1306. For example, the account with the screen name AIMBuddy has been selected as the recipient of the communication. The screen names of possible recipient accounts are presented in and may be selected from the recipient selection box 1306. The screen name of the recipient also may be typed in the recipient selection box 1306. An expanded recipient selection box 1308 includes the names of possible recipients of messages sent using the communication interface 1200. The expanded recipient selection box 1308 may be pre-populated with the names included in a buddy list for the sender selected in the sender selection box 1302. The expanded recipient selection box 1308 may be displayed below the recipient selection box 1306 when the arrow on the right side of the recipient selection box 1306 is selected. The expanded recipient selection box 1308 also may be displayed below the recipient selection box 1306 when attempting to scroll through the selections included in the recipient selection box 1306. In one implementation, as the sender is changed in the sender selection box 1302, the names of possible recipients of messages are changed to correspond to the newly selected sender's buddy list.

Alternatively or additionally, a recipient for the message may be chosen from the buddy list interface 400. In this case, the screen name for the recipient may be entered automatically entered in the recipient selection box 1306, and the screen name of the account whose buddy list the recipient was chosen from may be automatically entered in the sender selection box 1302.

The message to be sent is typed into the message text box 1208. After specification of the sender with the sender selection box 1302, the recipient with recipient selection box 1306, and the message in the message text box 1208, a send button 1210 is used to send the message from the sender to the recipient.

Referring to FIG. 13B, the appearance of the communication interface 1200 changes after the send button 1210 is pressed for the first time. In one exemplary implementation, once the sender and recipient accounts have been specified and one message has been sent from the sender to the recipient, the sender and recipient accounts may not be changed. Therefore, the sender selection box 1302 and the recipient selection box 1304 are removed from the communication interface 1200. A recipient indicator 1202 indicates the recipient chosen in the recipient selection box 1304, and a sender indicator 1204 indicates the recipient chosen in the sender selection box 1302. A transcript text box 1206 replaces the sender selection box 1302 and the recipient selection box 1304. The transcript text box 1206 includes the text of each message that has been sent between the sender and recipient accounts using the communication interface 1200, as well as an indication of whether the sender account or the recipient account sent the message.

A new message to be sent may be entered in the message text box 1208, and the message may be sent to the specified recipient by selecting the send button 1210. In addition, the recipient may be added to the sender's buddy list by selecting an add buddy button 1310.

Referring to FIG. 13C, before messages are delivered to the chosen recipient account from a chosen sender account, a determination is made as to whether the sender and recipient accounts are allowed to send messages to each other. If not, then the message that was specified in the message text box 1208 is not delivered to the recipient after the send button 1210 was selected. Instead a message from the communications system appears in the transcript text box 1206 informing the user that communication between the selected sender and recipient accounts may not occur. In addition, the recipient indicator 1202 indicates the communication was intercepted by the communications system, but the sender indicator 1204 still indicates the recipient chosen in the sender selection box 1302.

Communication between two accounts may be denied if the accounts do not belong to the same domain. For example, if the recipient belongs to a gaming club, but the sender does not, then the sender may not be allowed to send messages to the recipient. In general, communication may be denied if the sender does not have permission to send messages to the recipient or if the recipient denies a request to communicate with the sender.

Referring to FIG. 14A, a process 1400 is used by a sender to initiate communications with a recipient. The process 1400 begins when the sender chooses one of the accounts linked to the account used to sign in to the communications system to communicate from (1402). Next, the recipient of the communications is chosen (1404). The compatibility of the chosen sender and recipient accounts is checked to verify that communication between the sender and the recipient is allowed to occur (1406). If so, the sender account is free to send communications to the recipient (1408).

Referring to FIG. 14B, a process 1450 is used to respond to a message received from a user of the communications system. The process 1450 begins when a message is received from a user of the communication system by a client program that is running for multiple linked accounts (1452). The intended recipient of the message is determined (1454). The intended recipient is one of the linked accounts for which the client program is running. A response to the original message is sent from the linked account to which the original message was addressed (1456). The determination of the intended recipient account of the original message is automatic. Should a response to the original message be sent, it will automatically appear to be from the account to which the original message was sent.

Referring to FIG. 15, a process 1500 is used to forward messages to locations where recipients are available to receive them. Because accounts may be linked, the same account may be signed in to the communications system at multiple physical locations. A message is sent to every location where a recipient of the message is signed in to the communications system and may be replied to at any of the locations where the recipient account is signed in to the communications system. If an away message is up, the message is forwarded to the next location that does not have an away message up, where the locations are ordered based on the time of sign in. If away messages are up at all locations where the recipient account is signed in, the message is held at the location where the recipient account first signed in to the communications system.

The process 1500 begins when a message is received by the communications system (1502). A set of locations at which a recipient of the message is signed in to the communications system is identified (1504). The locations are the places where the message may be received by the recipient. The message is sent to one of the set of identified locations (1506). A determination is made as to whether the location is available to receive the message (1508). In other words, a determination is made as to whether the location has an away message displayed. If the location is available to receive the message because it does not have an away message displayed, then the message is left at the location (1510). If the location is unable to receive the message because an away message is up, then it is determined if there is another location that may be available to receive the message (1512). If there are no other locations that may receive the message, then the message is held at the location where the recipient first signed in to the communications system (1514). Otherwise, the message is forwarded to the next location in the set of locations, based on the sign in time of the recipient (1.516). A determination is made again as to whether the location may receive the message (1512). If so, the message is held at the location (1514). Otherwise it is forwarded to another location if one exists. In this manner a message may be passed between all of the locations where the recipient is signed in to the communications system so that the recipient can receive and respond to the message.

For example, consider again the linking scenario of FIG. 8A. Imagine that SN1 was used to sign in at a first location and that SN2 was used later to sign in at a second location. SN1 is linked to SN2, SN3, SN4, and SN5, so messages for SN1, SN2, SN3, SN4, and SN5 may be received at the first location. SN2 is linked to SN1 and SN7, so messages for SN1, SN2, and SN7 may be received at the second location. If the first location has an away message up and the second location does not have an away message up, then messages sent to SN1 and SN2 are forwarded to the second location. If the second location has an away message up, messages for SN1 and SN2 are forwarded to the first location, while messages for SN7 are held at the second location, the only place where SN7 is signed in. If both locations are have away messages displayed, then the messages for SN1 and SN2 are held at the first location, where SN1 and SN2 first signed in, and messages for SN7 are held at the second location, where SN7 first signed in.

Referring to FIG. 16A, a notification 1600 is presented after one of a specified series of events relating to the accounts listed on the buddy lists of a set of linked accounts. The header 1602 of the notification 1600 contains screen name of the linked account Whose buddy list contains the account that triggered the notification. The body 1604 of the notification contains the screen name of the account that triggered the notification as well as a description of the event that triggered the notification.

Certain actions by the accounts listed in the buddy lists for the linked accounts may cause a notification 1600 to appear. The actions include signing on to the communications system, signing off of the communications system, going away from the communications system by putting up an away message, returning from away, going idle by not using the communications system for a specified amount of time, and returning from idle. Which actions cause a notification to appear, if notifications are to appear at all, may be set in the preferences control panel 1650 of FIG. 16B. The section of the preferences control panel 1650 that governs when notifications 1600 are displayed may be accessed by selecting the notifications option 1652 in the list of preference categories. The notifications section of the preferences control panel 1650 includes a checkbox 1654 for selecting whether notifications 1600 should be displayed. Selecting the checkbox 1654 causes notifications 1600 to appear when they are triggered.

A series of options 1656-1666 govern which actions lead to the display of notifications 1600. For example, selecting option 1656 will cause notifications to appear when accounts on the buddy lists for the linked accounts sign on to the communications system. Similarly, selecting option 1658 causes notification to appear when accounts on the buddy lists sign off of the communications system. Option 1660 causes notifications 1600 to appear when accounts go away, and option 1662 causes notifications 1600 to appear when accounts return from away. Finally, option 1664 causes notifications 1600 to appear when accounts go idle, and option 1666 causes notifications 1600 to appear when accounts return from idle.

Any changes made to the preferences control panel 1650, including changes to the notifications settings, may be saved with an accept button 1668. Selecting the accept button 1668 closes the preferences control panel 1650 and applies the changes made to the preferences control panel. On the other hand, a cancel button 1670 may dismiss the preferences control panel 1650 without making any of the changes to the settings that govern when notifications 1600 are shown.

FIG. 17 shows a communications system 1700 that is capable of delivering and exchanging data between a requestor system 1705 and a provider system 1710 through a communications link 1715. The communications link 1715 may include communications pathways 1750 and 1755 that enable communications through one or more delivery networks 1760. The requestor system 1705 and communications link 1715 may have characteristics comparable to and may illustrate one possible implementation of the requestor system 105, 205 and 305 and the communication links 115, 215 and 315 of. FIG. 1, 2 or 3. The requestor system 1705 also may be referred to as a client system. Likewise, the provider system 1710 may have characteristics comparable to and illustrates one possible implementation of the provider systems 110, 210 or 310 of FIG. 1, 2 or 3. In general, and in contrast to the depiction of the provider systems 110, 210 or 310, the provider system 1710 includes an offline mobile proxy 1740 and a wireless server 1745 configured to enable communications between the client system 1705 and a mobile telephone device 1770 through the cellular system 1780.

The provider system 1710 includes a desktop instant messaging server 1730 that operates instant messaging server software configured to process communications sent from and received by users of an instant messaging service. In particular, the desktop instant messaging server 1730 is configured to exchange instant messages and communications related to the instant message service between the client system 1705 and the provider system 1710 over the communication link 1715. The desktop instant messaging server 1730 itself may be an implementation of the provider systems 110, 210 or 310 of FIG. 1, 2 or 3. In one implementation, the desktop instant messaging server 1730 does not include an ability to link multiple screen names belonging to a single user account. The desktop instant messaging server 1710 includes privacy control information 1730A that is used to determine whether a message (or a portion thereof) should be provided to an intended recipient. The privacy control information 1730A may be applied to instant messages and/or text messages sent from the wireless server to the mobile telephone device 1770 through the cellular system 1780. For example, the privacy control information 1730A may include rules identified by a user that are applied to receiving instant messages or text messages by an account associated with the user. Undesired words may be entered into privacy control information associated with the user and messages including those words may be blocked or the words deleted from the message, as determined by the user.

The desktop instant messaging server 1710 also includes code segments 1730B that enable a user to configure a buddy list associated with an instant messaging screen name. More particularly, the code segments 1730B enable a user to identify a screen name or other type of instant messaging identifier (such as an ICQ Number or a user account identifier) to be added to the user's buddy list, as described previously with respect to FIGS. 4 and 11. The code segments 1730B also enable a user to identify a mobile telephone number to be added to the user's buddy list. The mobile telephone number also may be assigned a surrogate identifier or alias (e.g., a name) to be displayed on the user's buddy list to help identify the identity associated with the mobile telephone number. An instant message may be addressed to the mobile telephone number in lieu of addressing an instant message to a screen name, as described more fully later.

The desktop instant messaging server 1730 also includes code segments 1730C to enable a user to configure the user's instant messaging account. In particular, the code segments 1730C enable a user to identify a mobile telephone number to be associated with the user's instant messaging user account. The mobile telephone number is stored in association with the user account in the user-device registry 1735. The code segments 1730C also enable a user to optionally request that instant messages be forwarded as text messages to the user's mobile telephone number when the user is offline—that is, not signed in to the instant messaging service.

The offline mobile proxy 1740 represents the online presence and/or availability of a user of the instant messaging system when the user is offline, thus enabling communications to offline users via alternative communication schemes (e.g., SMS text messaging), even if an instant messaging service is configured to restrict messaging to users who reflect online presence. The offline mobile proxy 1740 represents to the desktop instant messaging server 1730 that the user is capable of receiving an instant message when the user is actually offline. Accordingly, when the user is offline, their availability may be perceived by others and messages sent to them may be received using an alternative communications scheme (e.g., SMS test messaging). For instance, an offline user who has registered a mobile device (e.g., a cellular telephone) as available to receive messages while they are otherwise offline remains listed as available for messaging on the buddy lists of users who subscribe to their online presence. Moreover, an instant message intended for an offline user is received by the desktop instant messaging server 1730 and provided to the wireless server 1745, which communicates a text message based on the original instant message to the mobile telephone device 1770 associated with the offline user. The text message is communicated from the wireless server 1745 to the mobile telephone device 1770 thorough the cellular system 1780.

The offline mobile proxy 1740 includes code segments 1740A to manage online presence information. When the desktop instant messaging server 1730 detects that a user has logged off the instant messaging service, the desktop instant messaging server 1730 communicates the status of the user to the offline mobile proxy 1740, which executes code segment 1740A to indicate to the desktop instant messaging server 1730 that the user is online. In one implementation, the offline mobile proxy 1740 also executes code segment 1740A to update, or enable the update of, the screen name associated with a user to show a mobile indicator adjacent to the user's screen name on each of the buddy lists that include the user's screen name. The mobile indicator indicates that the user is available at their mobile device to receive messages inspired through manipulation of the buddy list in the ordinary manner, and also indicates that the user is not logged on to the desktop instant messaging service, as described more fully in FIGS. 18A-18D.

The offline mobile proxy 1740 also includes code segments 1740E that may be executed by the proxy 1740 to determine whether to forward an instant message sent to the mobile telephone device 1770 associated with the intended recipient of the original instant message. In one example, the proxy 1740 executing the code segments 1740B may determine whether a user is associated with a mobile telephone number (such as by accessing user-device registry 1735), and, if so, whether instant messages should be forwarded to the mobile telephone number conditionally based on a user state (e.g., offline) or request, or unconditionally (e.g., mirror to the mobile telephone). Accordingly, the proxy 1740 executing the code segments 1740B may determine to forward the instant message only when the user is offline or it instead may determine to forward the instant message only when the user has configured the user's account to forward instant messages. In yet another example, the proxy 1740 executing the code segments 1740B may determine that an instant message should be forwarded to a mobile device when the instant message is addressed to a mobile telephone number or addressed to a name that is assigned to a mobile telephone number. In any event, when the offline mobile proxy 1740 determines that an instant message is to be forwarded to a mobile device, the instant message is provided to the wireless server 1745.

The wireless server 1745 includes code segments 1745A configured to create message session entries for original instant messages and to store such message session entries in the message session information in a data store 1745B. The message session entry data store 1745B may be transient or persistent storage. The message session information may include a sender screen name, a recipient screen name, a temporary reply telephone number assigned by the wireless server 1745 to facilitate a reply to the text message sent to the mobile telephone device 1770, and a recipient mobile telephone number. The sender screen name and a recipient screen name are obtained from the original instant message received by the wireless server 1745. The temporary reply telephone number is assigned by the wireless server 1745 from a pool of temporary telephone numbers. The temporary reply telephone number may be in the form of a short code—that is, a number of lesser or greater digits than conventional telephone numbers, which nevertheless indicate a destination to the wireless server 1745. When the temporary reply telephone number is such a short code, the cellular system 1780 also may include a process for routing a text message that is sent to one of the short codes assigned by the wireless system 1745 to the provider system 1710. In contrast, the temporary reply telephone number may be a full-length traditional telephone number, or other routing code useful to enable the cellular system 1780 to route the text message to the provider system 1710.

The wireless server 1745 also includes code segments 1745C configured to prepare, based on an original instant message, a text message that is based on the short service (SMS) protocol, which is particularly useful in sending and receiving short text messages to mobile devices, such as mobile telephones. The code segments 1745C include addressing operations, such as using the user-device register 1735 to identify the mobile telephone number of the recipient identified in the instant message and addressing the text message to the identified mobile telephone number, and using the temporary reply telephone number as the source address in the text message to which replies to the text message are routed in the form of text messages. The process 1745C also may include converting the instant message to a different character set that is used by the text message. For example, an instant message may use an ASCII character set or a Unicode character set, whereas the text message may use a GSM (“Global System for Mobile Communications”) character set. In such a case, the process 1745C also converts the instant message from the ASCII or Unicode character set to the GSM character set.

Similarly, the wireless server 1745 also includes code segments 1745D configured to prepare an instant message that corresponds to a reply text message sent from the mobile telephone device 1770 in response to the text message based on the original instant message. The code segments 1745D may include code segments configured to convert the character set of the message from a character set used by the text message service to the character set used by the instant message service. The code segments 1745D also may include addressing operations, which include replacing the destination address of the reply text message with the instant messaging account name of the sender of the original instant message. This may be accomplished by accessing the message session entry created when the original instant message was forwarded as a text message to the mobile telephone device 1770. For example, the message session information may be identified through the use of the temporary reply telephone number assigned as the destination address of the reply text message. In particular, a message session entry may be identified in which the temporary reply telephone number of the entry corresponds to the destination address of the reply text message and the destination telephone number of the entry corresponds to the source address of the reply text message. Using both of the temporary reply telephone number and the destination telephone number collectively to identify the message session entry may be useful to enable the concurrent assignment of the same temporary telephone number for multiple text messages, which, in turn, may help to reduce the number of temporary telephone numbers needed by the wireless server 1745.

The code segments 1745D also are configured to determine a source address to use for the reply instant message. In particular, the code segments 1745D include addressing operations to determine a source address, and thus a sender identifier, to associate with the reply instant message for perception by a recipient of the reply instant message. The source address may be determined based on the recipient indicator identified by the send in the original message such that the sender is only presented with identity information available to the sender at the time when the original message was sent. The following two examples illustrate. First, if an instant message initially specified a screen name as its destination address, replies to that forwarded instant message similarly specify the screen name as the reply source address, even if they originate from a mobile device as SMS text messages. Second and similarly, if a forwarded instant message initially specified a telephone number as its destination address, replies to that instant message similarly specify the telephone number as the reply source address. In addition or alternatively, the source address to be reflected for a reply message may be determined, at least in part, based on information other than the destination address of the original instant message specified by the reply recipient, which is determined as available to the reply recipient, for example, through an inspection of their address book or buddy list. As such, the actual source of the reply (e.g., mobile telephone number or screen name) may not be hidden from users who otherwise are aware of such information. In fact, it may be advantageous to reveal the actual reply source in addition to the destination address specified by the reply recipient in their original message, so as to reveal information about the reply source while providing the reply recipient some continuity and understanding of the nature of the message as a reply to their original message. For example, the instant message interface may reveal an indication formatted as follows: “<screen name specified by reply recipient in their original message> (mobile telephone number actually used to generate response)<mobile telephone number>:” or “screen name (sent by 555-1212):”. The process of determining a source address to use as the displayed sender indication of an instant message display for the reply instant message is described more fully later.

The mobile telephone device 1770 is associated with a mobile telephone number to which telephone calls may be routed over the cellular system 1780. The mobile telephone device 1770 also may be associated with a SMS address that typically is the same as the mobile telephone number associated with the mobile telephone device 1770, though this need not necessarily be so. The mobile telephone device 1770 is capable of receiving, displaying, processing, and sending text messages over the cellular system 1780.

The cellular system 1780 may include a cellular network that is capable of transmitting and receiving digital or analog signals using cellular technologies, including Advanced Mobile Telephone System (AMPS), Narrowband Advanced Mobile Telephone Service (NAMPS), Frequency Shift Keying (FSK), Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), and Code Division Multiple Access (CDMA), or any standard, such as Global System for Mobile Communications (GSM) or Cellular Digital Packet Data (CDPD). Alternatively, the cellular system 1780 may be any type of telephone network capable of transmitting text messages to any type of telephone or mobile device.

In general, the communications system 1700A may be used to send an instant message sent from the client system 1705 to the provider system 1710, which transforms the instant message to a corresponding text message that is routed over the cellular system 1780 to the mobile telephone device 1770. The original instant message may be addressed to mobile telephone number of the mobile telephone device 1770, or the original instant message may be addressed to a screen name and forwarded to the mobile telephone device 1770 based on an association, in the user-device registry 1735, between the screen name and the mobile device, and detection of offline, status by the mobile device user. Also, the original instant message may be addressed to a screen name that is linked to another screen name, which, in turn, is associated with the mobile telephone number of the mobile telephone device 1770.

The user of the mobile telephone device 1770 may reply, or respond, to the received text message. The reply text message is sent over the cellular system 1780 to the provider system 1710. The provider system 1710 transforms the reply text message to a reply instant message that is presented to the sender of the original instant message. The sender indication displayed for the reply instant message is the same as the recipient indication selected by the sender for the original instant message. Thus, the only addressing or account information revealed to the sender of the original instant message is the information available to the sender of the original instant message. In some cases, the source of a reply message, such as the reply text message or the reply instant message, is disguised, hidden or obfuscated so that the addressing or account information unknown to the sender is not revealed to the sender.

Referring to FIGS. 18A-18C, interfaces 1800A-1800C are displayed for configuring a buddy list associated with user of a communications system. The interfaces 1800A-1800C may be displayed, for example, when a process to add a new buddy to a buddy list is initiated by a user and executed by a processor. More particularly, FIG. 18A displays an interface 1800A for adding a new entity as a buddy on a user's buddy list. The interface 1800A includes an option 1810A to add an entity identified by a screen name, an ICQ number or some other type of instant messaging identifier, and an option 1.810B to add an entity identified by a mobile telephone number to the buddy list associated with the user. An entity identified by a instant message identifier may be referred to as an instant message entity or a potential message recipient. An entity identified by a mobile telephone number may be referred to as a mobile telephone entity, a mobile telephone buddy, a cell phone buddy, or a potential message recipient. Each of the options 1810A and 1810B is selectable by the user using selection indications associated with the option 1810A or 1810B, respectively, to identify the type of entity (e.g., a mobile telephone entity or an instant messaging entity) to be added as a buddy to the buddy list. When the user selects to save the entry and thus add an instant messaging entity to the user's buddy list, the interface 1800A includes an entry portion 1820A to which the user may identify the instant messaging identifier of the entity. The interface 1800A also includes a control 1825A to add the entity entered in the entry portion 1820A to the user's buddy list and to close the interface 1800A. The interface 1800A also includes a control 1830B to cancel and thus close the interface 1825A without adding an entity to the buddy list.

FIG. 18B displays an interface 1800B for adding a new entity identified by a mobile telephone number as a buddy. As shown, when the user selects to add a cell phone number to the user's buddy list by selecting the cell phone number option 1815B, the interface 1800A includes an entry portion 1820B to which the user may enter the cell phone number to be added to the user's buddy list. The entry portion 1820B is partitioned into separate sections that correspond to parts of a telephone number, though the entry portion 1820B need not necessarily be partitioned. In some implementations, the same entry portion may be used to enter an instant message entity and a mobile telephone number entity.

FIG. 18C displays an interface 1800C that presents a message 1810C to the user, indicating that the mobile telephone number has been saved as a buddy on the user's buddy list. The interface 1800C also presents an name entry portion 1850C configured to accept user input of text to be assigned as a name to be displayed in the buddy list for the mobile telephone number entered in interface 1800B. It is important to note that the name displayed for the mobile telephone number is not linked to or otherwise associated with a screen name for a user. Thus, the entry of a mobile telephone number on a user's buddy list may help to enable an instant message user to send an instant message to an entity that is not otherwise configured to use instant messaging services wherein the processor is fuhher configured to use instant messaging services other than those used by the sending instant message user, which may or may not be compatible/integrated with the instant message services used by the sending instant message user. Moreover, entry of this mobile information enables instant message communications with users whose screen names are unknown to the sender, even if they subscribe to a common and/or compatible/integrated instant message service.

Referring to FIG. 18D, a buddy list interface 1800D is displayed for a user of a communication system capable of sending instant messages to a mobile telephone number that is not associated with a ‘user of the instant’ messaging service. The buddy list interface 1800D may be an implementation of the buddy list interface 400 a of FIG. 4 or 11. The buddy list interface 1800D includes a buddy list 402 a for an entity having screen name AIMUIUser. The buddy list 402 a includes a mobile telephone entity 1805D for which the mobile telephone number is displayed as the entity identifier. The buddy list 402 a also includes a mobile indicator 1807D that reflects a mobile telephone number as the only known means for contacting the entity associated with the name (here, BMVassallo) adjacent to the mobile indicator 18070. Thus, BMVassallo is an alias for a mobile telephone number that is not associated with an instant message account or screen name. The buddy list 402 a also includes a mobile indicator 18100. The buddy list 402 a also includes an indicator 18100 adjacent to an instant message entity listed on the buddy list 402 a positioned to reflect that the user account for Steve Clark is configured to send instant messages sent by the Steve Clark entity to a mobile telephone number associated with the instant message account of the Steve Clark because the Steve Clark entity is offline.

In one implementation, the indicator 1820D shows that the user account for the AIMUIUser is configured to send instant messages sent by the ATIMUIUser entity to a mobile telephone number associated with the instant message account of the AIM Miser when the AIMUIUser entity is offline. In particular, the indicator 1810D indicates that “Mobile IM is enabled” for the AIMUIUser entity. This may be useful to remind the user that the user's account is configured to forward instant messages to a mobile telephone when the user is offline. In another implementation, the indicator 1820D may be used to reflect whether an instant message account for an entity included in the buddy list 402 a is configured to send instant message sent to the entity to a mobile telephone number associated with the instant message account for the buddy. Thus, the indicator 1820D may be used to reflect the instant message mobile forwarding capability associated with a buddy when the buddy is selected on the buddy list 402 d. In this other implementation, the indicator 1820D would not appear in the interface 1800D when a buddy is selected on the buddy list 402 a who has not enabled a mobile forwarding capability for the selected buddy's instant message account.

FIG. 19 illustrates a process 1.900 for communicating between two electronic devices, such as a client system of an instant messaging service and a mobile telephone device capable of receiving, processing, displaying and transmitting text-messages. The process 1900 may be performed, for example, by a processor on the provider system 1710 of FIG. 17.

The process 1900 begins when a user creates an original message that includes an source indicator and an intended destination indicator and the original message is received by the provider system (step 1910). The user, who may be referred to as a sender, may do so using an instant messaging application to identify a buddy from within their buddy list as the intended destination indicator. Accordingly, the intended destination indicator may be, for example, a screen name or a mobile telephone number of an entity listed on the sender's buddy list. Alternatively, the original message may be a text message created by the sender using an mobile telephone device configured for text messaging, as described later.

Subsequently, the provider system receives a reply message from the intended recipient of the original message (step 1920). The reply message includes a reply source indicator that indicates an address from which the reply was sent and a reply destination indicator that indicates an address to which the reply is destined. For example, the reply message may be a text message sent by the mobile telephone device to which the original message was delivered.

The provider system optionally determines whether the reply source indicator of the reply message is the same as the intended destination indicator and takes appropriate action based on that determination (step 1930). To do so, for example, the provider system may access a message session entry that corresponds to the communication and compare the reply source indicator with the destination indicator of the original message received (step 1910). When the reply source indicator is different from the destination indicator, the provider system may replace the reply source indicator in the reply message with the destination indicator of the original message; otherwise, the provider system need not necessarily take any action.

The provider system sends a communication based on the reply message with the communication having a reply source indicator that is the same as the intended destination indicator identified by the sender of the original message (step 1940). For example, the provider system may create an instant message based on a text message sent by from the mobile telephone device. The instant message is sent to the destination indicated in the received reply message or a destination that corresponds to the destination indicated in the received reply message, as described later with respect to FIGS. 21-23.

In some implementations, the provider system may replace the reply source indicator with the destination indicator of the original message without first determining whether such action is needed as described previously with respect to step 1930. However, when the reply source indicator is the same as the destination indicator, the provider system may be replacing the reply source indicator unnecessarily. In some instances, it may be more efficient for the provider system to do so in lieu of determining whether such action is necessary.

The provider system optionally enables the display of the communication based on the reply message (step 1950). This may be accomplished, for example, by the provider system sending an instant message to the client system for display by the instant messaging application on the client system.

Before discussing additional detail regarding the method by which an instant message is communicated to a mobile telephone enabled with text messaging, an example format that may be used for a message session information entry is first described in FIG. 20. FIG. 20 shows an example data structure 2000 for a message session information entry in simplified form. The data structure 2000 includes a message session identifier 2010 to uniquely identify each entry in the message session information. The data structure 2000 also includes an original sender 2020 that identifies an original source indicator of the original instant message sent by the sender, and an original recipient 2030 that identifies an intended destination indicator for the original instant message.

The data structure 2000 also includes a temporary reply telephone number 2040 that may be used as a source indicator in text messages sent to a mobile telephone device based on an instant message directed to recipient 2030. The temporary reply telephone number 2040 also may be used as a destination indicator for a reply text message sent from the mobile telephone device in response to text messages sent to the mobile telephone device based on the original instant message.

The data structure 2000 also includes a destination mobile telephone number 2050 that identifies the destination mobile telephone device of a text message sent to the mobile telephone device based on the original instant message. The destination mobile telephone number 2050 may be used as a destination indicator in a text message sent to a mobile telephone device based on a mobile telephone number that is associated with the recipient 2030 of the original instant message. Alternatively, the destination mobile telephone number 2050 may correspond to the mobile telephone number specified in the buddy list entry or input by command line entry, for example, when the original instant message is directed to a mobile telephone identity such as mobile telephone identity 1805D of FIG. 18 or sent using a dialog box or command line entry to specify a mobile telephone number as the destination address for a message initiated via instant messaging.

The data structure 2000 also may include an indication 2060 of a destination type of original instant message—e.g., whether the message is directed to an instant message account entity (such as a screen name) or a mobile telephone entity. The indication 206Q also may be referred to as a destination flag. An indication of the type of original destination may be discerned from information other than the indication 2060, enabling confirmation or elimination of indication 2060. For example, some implementations may include a destination mobile telephone number 2050 only when the recipient 2030 is an instant message entity and the recipient account is associated with a mobile telephone number to which instant messages are to be sent as text messages. In such a case, a determination of the type of entity that is associated with the destination of the original instant message may be based on whether the destination mobile telephone number 2050 is filled in for the entry. Stated differently, some implementations may fill in the destination mobile telephone number 2050 only when the recipient 2030 is an instant message entity (and is not a mobile telephone entity); otherwise, the destination mobile telephone number 2050 is not filled in (when the recipient 2030 is a mobile telephone entity).

The data structure 2000 also may include a creation timestamp 2070 or other indication of when the message session entry was created, the age of the entry, or a time when the entry is to expire. The creation timestamp 2070 may be useful to guide the deletion, expiration, or purging of aging message session entries in message session information.

FIG. 21 shows a process 2100 by which a client system communicates an instant message through an instant messaging provider system to a mobile telephone that is enabled with text messaging capabilities and a reply to the instant message is returned to the client system. The process 2100 involves a client system 2105, an instant messaging provider system 2110, a cellular system 2180, and a mobile telephone 2170 enabled with text messaging capabilities. In general, the process 2100 enables an instant message sent by the client system 2105 to be received and processed by the instant messaging provider system 2180, which, in turn, sends a text message based on the instant message to the mobile telephone 2170 over the cellular system 2180. A user associated with the mobile telephone 2170 replies to the text message received by the mobile telephone 2170. The reply text message is sent from the mobile telephone 2170 over the cellular system 2180 to the instant messaging provider system 2180. The instant messaging provider system 2180 sends to the client system 2105 a reply instant message based on the reply text message received from the mobile telephone 2170. The reply instant message includes the intended destination of the original instant message as the source indicator of the reply instant message. Thus, the source indicator of the reply instant message prevents disclosure of any information that was not previously available to, and used by, the sender of the original instant message. This may be useful, for example, to protect a mobile telephone number associated with the intended recipient of the original instant message from being revealed to the sender of an instant message when the instant message is forwarded to the recipient's mobile telephone number by the instant messaging provider system 2180.

More particularly, a user associated with the client system 2105 identifies an intended recipient of the instant message by selecting an entity from the user's buddy list and enters text for the instant message, which is received by the client system 2105 (step 2120CL). The instant message, as described previously, includes a source indicator of the instant message that indicates that the instant message is sent from the sender's instant message account. This may be accomplished by identifying the sender's screen name as the source indicator. The instant message also includes a destination indicator that identifies the entity selected from the user's buddy list. The selected entity may be a mobile telephone entity for which a mobile telephone number, rather than an instant message user account, is identified as the destination address of the instant message. Alternatively, the selected entity may be an instant message entity for which a user account of the instant message service is identified as the destination address of the instant message. The client system 2105 sends the instant message, which may be referred to as an original instant message, to the instant Messaging provider system 2180 (step 2122CL).

The instant messaging provider system 2180 receives the instant message (step 2122PS) and detects the mobile presence of the intended recipient of the instant message (step 2124PS). Detecting mobile presence may include determining whether the instant message needs to be routed as a text message to a mobile telephone, and determining whether the original instant message is addressed to a mobile telephone entity (e.g., a mobile telephone entity was selected by the sender of the original instant message), which implies the need to route the original instant message as a text message to the mobile telephone. When the original instant message is addressed to an instant message entity (e.g., a screen name), the mobile presence of the intended recipient may be detected based on the offline status of the instant message entity that has configured the user's instant message account to forward instant messages to a mobile telephone number. In some implementations, the detection of mobile presence of the intended recipient may be determined merely by querying on-line presence information to determine whether the user account is associated with a mobile indicator, as previously described.

In response to detecting the mobile presence of the intended recipient (step 2124PS), the instant messaging provider system 2180 determines a mobile telephone number of the intended recipient (step 2126PS). This may be accomplished, for example, by accessing a user-device registry, such as user-device registry 1735 of FIG. 17, that associates a mobile telephone number with a user account when an instant message entity is the intended recipient of the original instant message. In contrast, when a mobile telephone entity is the intended recipient of the original instant message, the mobile telephone number of the entity may be determined directly from the entity.

The instant messaging provider system 2180 also determines a temporary reply telephone number for the text message (step 2128PS), as described previously.

The instant messaging provider system 2180 creates an entry of message session information that corresponds to the original instant message (step 2130PS). Using the data structure 2000 as an example, a message session identifier 2010 may be assigned to uniquely identify the message session entry, the sender indication of the original instant message may be stored as the original sender 2020, the intended destination may be stored as the original recipient 2030, the temporary reply telephone number is stored as the temporary reply telephone number 2040, and the determined mobile telephone number may be stored as the destination mobile telephone number 2050 in the message session entry. Thus in this example, when the intended recipient of the original instant message is a mobile telephone entity, the original recipient 2030 and the destination mobile telephone number 2050 both reflect same mobile telephone number. When the intended recipient of the original instant message is an instant message entity, the original recipient 2030 is the screen name of the intended recipient and the destination mobile telephone number 2050 is the mobile telephone number to which the user associated with the screen name desires instant messages to be forwarded. The indication 2060 of the destination type also is set to indicate that a screen name was identified as the recipient by the sender of the original instant message when the intended recipient of the original instant message is an instant message entity. In contrast, when the intended recipient of the original instant message is a mobile telephone entity, the indication 2060 is set to indicate a mobile telephone number was identified as the recipient by the sender of the original instant message.

The instant messaging provider system 2180 creates a text message based on the instant message using the determined mobile telephone number as the destination address and using the temporary reply telephone number as the source address (step 2132PS). The instant messaging provider system 2180 then sends the text message to the cellular system 2180 (step 2134PS), which, in turn, receives and sends the text message to the mobile telephone 2170 (step 2134CES).

The mobile telephone 2170 receives the text message and enables a user of the mobile telephone 2170 to review and respond to the text message (step 2134MT). The mobile telephone 2170 receives, from user input, reply text (step 2136MT) and creates a reply text message using the reply text as the message text, using the mobile telephone number as the reply source address and using the temporary reply telephone number as the reply destination address (step 2138MT). As is conventional, the reply text message uses the source address of the text message (here, the mobile telephone number of the mobile telephone 2170) as the destination address of the reply text message. The reply text message uses the destination address of the text message (here, the temporary reply telephone number) as the source address of the reply text message. The mobile telephone 2170 then sends the reply text message to the cellular system 2180 (step 2140MT), which, in turn, receives and forwards the reply text message to the instant messaging provider system 2180 (step 2140CES). For example, the cellular system 2180 may determine that the reply text message is to be forwarded to the instant messaging provider system 2180 based on the temporary reply telephone number in the reply text message.

The instant messaging provider system 2180 receives the reply text message (step 2140PS) and creates a reply instant message based on the reply text message by using the message text as the message text of the instant message (step 2142PS). The instant messaging provider system identifies an entry in the message session information that corresponds to the original instant message that inspired the reply text message (step 2144PS). The entry is identified based on the mobile telephone number in the source address of the reply text message and the temporary reply telephone number in the destination address of the reply text message (step 2144PS). This may be accomplished, for example, by searching message session information. For an entry that has a temporary reply telephone number 2040 that corresponds to the destination address of the reply text message and a destination mobile telephone number 2050 that corresponds to the source address of the reply text message.

The instant messaging provider system 2180 then uses the message session entry to determine whether the destination of the original instant message was identified by the sender as an instant message account or a mobile telephone number (step 2146PS). To do so, the instant messaging provider system 2180 may access the indication 2060 of the destination in the message session entry or, alternatively, the instant messaging provider system 2180 may access the destination mobile telephone number 2040 of the message session entry, as described previously.

When the original instant message was directed by the sender to an instant message entity, the instant messaging provider system 2180 uses the recipient 2030 of the message session entry as the source address of the reply instant message that corresponds to the reply text message (step 2148PS). In contrast, when the original instant message was directed by the sender to a mobile telephone entity, the instant messaging provider system 2180 uses the destination mobile telephone number 2050 of the message session entry as the source address of the reply instant message that corresponds to the reply text message (step 2150PS). In this case, when the text message was not forwarded by the cellular system to a different mobile telephone number (as may occur, for example, if the mobile telephone 2170 had enabled call forwarding to forward the text message to another mobile telephone number), the destination mobile telephone number 2050 is the same as the source address of the reply text message received by the instant messaging provider system 2180.

In some implementations, in lieu of steps 2144PS-2148PS being performed, the instant messaging provider system 2180 uses the original recipient 2030 as the source address of the reply text message received by the instant messaging provider system 2180. Thus, when the original recipient is a mobile telephone entity, the source address indicates the mobile telephone of the mobile telephone entity. When the original recipient is an instant message entity, the source address indicates the screen name of the instant message entity and does not indicate the mobile telephone number to which the instant message was forwarded.

The instant messaging provider system 2180 then sends the reply instant message to the client system (step 2152PS). The client system, in turn, receives and displays the reply instant message for the sender of the original instant message (step 2152CS).

FIGS. 22 and 23 illustrate exemplary messages that may be sent, for example, using the process 2100 of FIG. 21. FIG. 22 shows a flow 2200 of exemplary messages inspired by an instant message sent from a client system and directed to an instant message account (e.g., screen name). A message session entry 2215 having message session information is created as part of the process during which the messages are created and processed. The entry 2215 is not part of the message flow 2200 but is used to create and process messages in the flow 2200.

The flow 2200 of exemplary messages includes a message 2210 that represents an original instant message sent by a sender from an instant message client system to an instant messaging provider system. The original instant message 2210 is directed to a screen name that corresponds to an instant message account for which mobile instant message forwarding is enabled. In particular, the screen name to which the original instant message is directed is “Steve Clark,” which may correspond to the buddy 1810D in the buddy list 1800D of FIG. 18D. The screen name of the sender (here, AIMUIUser) is identified as the source indicator of the original instant message 2210.

The flow 2200 also includes a message 2220 that represents a text message (e.g., an SMS text message) generated based on the original instant message 2210. The text message 2220 (which also may be referred to as an original text message) is created by the instant messaging provider system based on the original instant message using the message session entry 2215. The text message 2220 is sent to the cellular system for routing to the mobile telephone associated with the intended recipient (here, Steve Clark). The text message 2220 identifies the mobile telephone number associated with Steve Clark as the destination address and identifies a temporary reply telephone number (described earlier) as the source address. As illustrated, the temporary reply telephone number is a short code that indicates to the cellular system that the messages so identified are to be routed to the instant messaging provider system.

The flow 2200 also includes a message 2230 that represents a reply text message that may be sent from the mobile telephone of Steve Clark to the instant messaging provider system. The reply text message 2230 is created by the mobile telephone in response to user input. The reply text message 2230 identifies the mobile telephone number associated with Steve Clark as the source address and identifies a temporary reply telephone number as the destination address. It is sent from the mobile telephone to the cellular system, which forwards the reply text message to the instant messaging provider system based on the destination address in the reply text message.

The flow 2200 also includes a message 2240 that represents a reply instant message generated based on the reply text message. The reply instant message 2240 is created by the instant messaging provider system with the use of message session entry 2215. The instant messaging provider system identifies the message session entry 2215 based on the destination address and source address of the reply text message. The reply instant message 2210 identifies the recipient of the reply instant message as the sender instant message account (here, “AIMUIUser”). Moreover, because the original instant message 2210 identified the intended recipient using a screen name (here, “Steve Clark”), the reply instant message 2240 identifies the sender of the reply instant message also using the same screen name (here, “Steve Clark”). As illustrated by the flow 2200, the mobile telephone number to which the instant message is forwarded (and from which the reply text message is generated) is hidden from the sender of the original instant message.

In contrast to FIG. 22, FIG. 23 shows a flow 2300 of exemplary messages exchanged in the process 2100 that are inspired by an instant message sent from a client system and directed to a mobile telephone number (e.g., a mobile telephone buddy), and an entry 2315 of message session information that corresponds to a message session entry created as part of the process 2100. The original instant message 2310 is directed to a mobile telephone number. In particular, the mobile telephone number entity to which the original instant message is directed is “703-123-4567,” which may correspond to the buddy 1805D in the buddy list 1800D of FIG. 18D. The screen name of the sender (here, AIMUIUser) is identified as the source indicator of the original instant message 2310, as was the source indicator of the original instant message 2210 in FIG. 22.

The flow 2300 also includes an original text message 2230 that is based on the original instant message 2310. The original text message 2230 is created by the instant messaging provider system based on the original instant message using the message session entry 2315. The original text message 2230 also identifies the mobile telephone number identified as the recipient account name in the message session entry 2315 to which the original instant message was sent as the destination address and identifies a temporary reply telephone number as the source address. The original text message 2230 is sent to the cellular system for routing to the mobile telephone number identified as the destination address (here, “703-123-4567”).

The how 2300 also includes a message 2330 that represents a reply text message that is sent from the mobile telephone associated with the mobile telephone number 703-123-4567 to the instant messaging provider system. The reply text message 2230 identifies the mobile telephone number of 703-123-4567 as the source address and identifies the temporary reply telephone number as the destination address.

The flow 2300 also includes a reply instant message 2340 that is based on the reply text message 2330. The reply instant message 2340 is created by the instant messaging provider system with the use of message session entry 2315. The instant messaging provider system identities the message session entry 2315 based on the destination address and source address of the reply text message. Because the original instant message 2310 identified the intended recipient as a mobile telephone number (here, “703-123-4567”), the reply instant message 2340 identifies the recipient of the reply instant message also a mobile telephone number (here, “703-123-4567”). The reply instant message 2340 identifies the recipient of the reply instant message as the sender instant message account (here, “AIMUIUser”). As illustrated by the flow 2300, the mobile telephone number to which the original instant message is directed is the same as the source indicator of the reply instant message. Thus, in this example, the identifiers not used by the original sender are obfuscated.

The techniques and concepts described with respect to forwarding an instant message directed to a screen name to a mobile telephone without revealing the mobile telephone number to which the instant message was forwarded may be used when the source indicator of an instant message or a destination indicator of an instant message is based on a linked account. Alternatively or additionally, whether the mobile telephone number to which an instant message has been forwarded is revealed in a reply message may be controlled based on a user preference. In one example, a user preferences for a user account may indicate whether the user associated with the user account desires to reveal a mobile telephone number. In another example, a user may be prompted when sending a reply to an instant message that has been forwarded to determine whether the mobile telephone number is to be revealed in the reply. When the user wishes to reveal the mobile telephone number, the source indicator of the reply instant message indicates the mobile telephone number to which the original instant message was forwarded and from which the reply message originated. This may be accomplished by using the destination mobile telephone number in the message session entry as the source indicator of the reply instant message. Alternatively, the source indicator of the reply instant message may correspond to the source address in the reply instant message.

The techniques and concepts of protecting information used to direct messages from being revealed, in a reply message, to a user who is not known to possess that information have been described in the context of forwarding an original instant message to a mobile telephone as a text message. The techniques and concepts may be applicable when a text message that originates from a mobile telephone is forwarded to an instant message service for presentation to an instant message recipient. In such a case, when the original text message identifies a screen name of the instant message recipient, the reply from the instant message service that is presented as a reply text message need not obfuscate the screen name of the reply sender. This is because the original text message identified the screen name and the reply that identities the same screen name does not reveal information (here, the screen name) to the original sender.

Alternatively, when the original text message identifies a mobile telephone number that is forwarded to an instant message recipient from which a reply is received from the instant message service, the reply text message may obfuscate the screen name of the reply sender. This is because the original text message did not identify the screen name of the reply sender and a reply text message that identified the screen name of the sender of the reply would reveal information (here, the screen name) that the sender of the original text message was not known to possess. The techniques of forwarding electronic messages, particularly those formatted as SMS messages, from a mobile telephone that is enabled with text messaging capability is described in U.S. application Ser. No. 10/723,040, filed Nov. 26, 2003, and titled “Electronic Message Forwarding,” which is incorporated by reference.

Although the techniques and concepts often are described above in terms of SMS text messaging, the techniques and concepts may be applied to other types of messages, such as a Multimedia Messaging Services (MMS) message, a video message and an audio message. Similarly, the techniques and concepts have been describe in terms of receiving an instant message is received at desktop computer receive instant messages addressed to the instant message identifier. Other electronic devices configured to receive instant messages may be used, such as a laptop computer, a personal data assistant (PDA) and a telephone receiver.

The described systems, methods, and techniques may be implemented in digital electronic circuitry, computer hardware, firmware, software, or in combinations of these elements. Apparatus embodying these techniques may include appropriate input and output devices, a computer processor, and a computer program product tangibly embodied in a machine-readable storage device for execution by a programmable processor. A process embodying these techniques may be performed by a programmable processor executing a program of instructions to perform desired functions by operating on input data and generating appropriate output. The techniques may be implemented in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device. Each computer program may be implemented in a high-level procedural or object-oriented programming language, or in assembly or machine language if desired; and in any case, the language may be a compiled or interpreted language. Suitable processors include, by way of example, both general and special purpose microprocessors. Generally, a processor will receive instructions and data from a read-only memory and/or a random access memory. Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as Erasable Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and Compact Disc Read-Only Memory (CD-ROM). Any of the foregoing may be supplemented by, or incorporated in, specially-designed ASICs (application-specific integrated circuits).

It will be understood that various modifications may be made without departing from the spirit and scope of the claims. For example, advantageous results still could be achieved if steps of the disclosed techniques were performed in a different order and/or if components in the disclosed systems were combined in a different manner and/or replaced or supplemented by other components. As another example, a screen name is used throughout to represent a unique identifier of an account, but any other unique identifier of an account may be used when linking accounts. Accordingly, other implementations are within the scope of the following claims. 

What is claimed is:
 1. A computer program product that, when executed, generates a graphical user interface on a display device for using a computer service to communicate, the graphical user interface comprising: a list of potential message recipients selected by a user as significant to the user; a mobile device identifier associated with one or more of the listed potential message recipients; and a user account identifier associated with one or more of the listed potential message recipients, wherein at least one of the listed potential message recipients includes a mobile device identifier as the only available conduit for data delivery to the potential message recipient using the computer service. 