US20080046969A1 - Method and system for auto-login by calling line identification - Google Patents
Method and system for auto-login by calling line identification Download PDFInfo
- Publication number
- US20080046969A1 US20080046969A1 US11/826,105 US82610507A US2008046969A1 US 20080046969 A1 US20080046969 A1 US 20080046969A1 US 82610507 A US82610507 A US 82610507A US 2008046969 A1 US2008046969 A1 US 2008046969A1
- Authority
- US
- United States
- Prior art keywords
- user
- internet
- computing device
- information
- enabled computing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/66—Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
Definitions
- the description relates generally to telephony services. More specifically, the context is Internet telephony.
- Certain information on a user's computer that is connected to the Internet or from a user's internet application or web-based account may be useful to access in cases where the user is either (a) not near his computer, (b) does not have the ability to access his computer over the Internet (e.g., such as by using peer-to-peer software installed on another computer or smart phone) or (c) his computer is closed.
- the present invention allows the user to access information on his computer or from a web-based account stored somewhere on the internet via any telephone.
- the present description provides a method for automatically logging in a user to an Internet-enabled computing device.
- the computing device runs a validation application and has access to information specific to the user, namely user-specific information.
- the method comprises initiating a call from a first telephone means to a second telephone means.
- the call has associated thereto calling line identification (CLID) information.
- CLID calling line identification
- the second telephone means provides access to the Internet-enabled computing device.
- the validation application on the Internet-enabled computing device, compares the CLID information to the user-specific information.
- the method further comprises validating the CLID information using the comparison, and upon positive validation, logging in the user to the Internet-enabled computing device.
- the present description provides a system for automatically logging in a user to an Internet-enabled computing device upon initiation of a call from a first telephone means to a second telephone means.
- the call has associated thereto calling line identification (CLID) information and the second telephone means is for providing access to the Internet-enabled computing device.
- CLID calling line identification
- the system comprises an input for receiving the CLID information; a database comprising information specific to the user, namely user-specific information; and the Internet-enabled computing device on which is installed a validation application for comparing the CLID information to user-specific information and for validating the CLID information using the comparison.
- the Internet-enabled computing device is for logging in the user to the Internet-enabled computing device.
- FIG. 1 is a block diagram providing an overview of the environment in which embodiments of an auto-login system and method are implemented.
- FIG. 2 is a flow chart illustrating an exemplary embodiment of a method for automatically logging in a user.
- first telephone means 100 that may be linked to second telephone means 102 through a network 104 .
- first telephone means 100 may be linked to second telephone means 102 through IP-based network 114 .
- the links between first telephone means 100 and second telephone means 102 can be wire-based or wireless.
- Network 104 can be any type of network adapted to communicate with first telephone means 100 and second telephone means 102 such as a Public Switched Telephone Network (PSTN), an Internet Protocol (IP) network or any combination of the two.
- PSTN Public Switched Telephone Network
- IP Internet Protocol
- FIG. 1 further shows Internet-enabled computing device 106 in communication with second telephone means 102 and database 108 .
- Internet-enabled computing device 106 is in communication with IP-based network 114 (e.g. the Internet).
- the auto-login system 110 (also referred to herein as the system for automatically logging a user) comprises, in an embodiment, Internet-enabled computing device 106 , second telephone means 102 and database 108 .
- the person skilled in the art will understand that it is not essential that Internet-enabled computing device 106 , second telephone means 102 and database 108 be embodied in a single machine or even in a single location.
- the components of system 110 can be in various machines or in various locations.
- Internet-enabled computing device 106 is shown as hosting validation application 112 which will be discussed in further detail below.
- second telephone means 102 is an Internet telephone application 116 installed on Internet-enabled computing device 106 .
- Validation application 112 allows a user to access information available on the user's computer (e.g., Internet-enabled computing device 106 ) or Internet 114 , by dialling in from a phone (e.g., first telephone means 100 ) associated with a specific phone number.
- the present method and system use calling line identification (CLID) information associated with an incoming call to establish the identity of the user.
- CLID information can pertain to a telephone (also referred to herein as first telephone means 100 ) likely or expected to be used by the user, which can include a Public Switched Telephone Network (PSTN) phone or a mobile phone or a Voice over Internet Protocol (VoIP) phone.
- PSTN Public Switched Telephone Network
- VoIP Voice over Internet Protocol
- validation application 112 runs on an Internet-enabled computing device 106 that can be the user's home computer or a device which can be hosted elsewhere.
- a validation application 112 can be installed together with an Internet telephony application 116 (e.g., Skype) on a user's Internet-enabled computing device 106 .
- Also stored on the Internet-enabled computing device 106 is user-specific information, such as account credentials for a web-based account, or a “.PST” file for use in Microsoft Outlook.
- the validation application 112 After a call is received at the user's VoIP number (e.g., “Skype-in” when the Internet telephony software is Skype) from any phone and handled by the Internet telephony application 116 , the validation application 112 intervenes and recognizes that the user has himself dialled his own VoIP number (e.g., based on calling line identification—CLID). An authentication step may be provided to confirm the identity of the user and ensure that further access is permitted.
- VoIP number e.g., “Skype-in” when the Internet telephony software is Skype
- an authorized user first registers an association between that user and a specific telephone number (or plurality of telephone numbers) that the user expects to use (i.e., the telephone number of first telephone means 102 ) for placing a call to the second telephone means 104 . It is therefore understood that a user can setup a plurality of first telephone means 102 even though it is not shown as such on FIG. 1 .
- the telephone number is stored in database 108 accessible to validation application 112 .
- authentication credentials e.g., password or PIN
- the authorized user dials his own VoIP number (i.e., that of the second telephone means 104 )
- the user will reach the Internet telephone application 116 (e.g., a VoIP application) running on the computer.
- the validation application intervenes and obtains the CLID information, e.g., by requesting it from the VoIP application.
- the validation application compares the CLID information to the specific telephone number to determine whether the person dialling the call is the authorized user.
- the authorized user is automatically “logged in”.
- the authorized user is logged into a local application (e.g., Microsoft Outlook, MSN Messenger, etc. not shown) that utilizes user-specific information locally stored in database 108 .
- validation application 112 triggers opening of an Internet session (e.g., Yahoo voice, Hotmail, etc.) with a target web site.
- the validation application accesses the account credentials associated with the authorized user and transfers them to the web site, thus allowing the authorized user to gain access (i.e., log in) to an Internet-accessible account via the web site.
- the caller may nevertheless be asked to authenticate himself by providing a password or PIN stored in database 108 .
- the password is used for an Internet application such as Skype, it is possible to avoid keeping the password in any database or on any device.
- the password is interactively asked to the user when needed and passed directly to the application login along with his user name. If the application logs in with no password error, it is thus verified that the user entered the correct password and is valid.
- CLID information is present but corresponds to a telephone number that is not in database 108 , there is no automatic user login. Rather, the caller may be prompted to enter certain additional credentials.
- the user may access Internet-related functions, such as Internet voice mail and email, using any regular telephone.
- Other functions are also possible, such as Internet telephony using the user's own computer as a bridge.
- FIG. 2 there is shown an embodiment of the method 200 for automatically logging in a user to an Internet-enabled computing device.
- the Internet-enabled computing device running a validation application and has access to information specific to the user, namely user-specific information.
- Method 200 comprises, at step 202 , initiating a call from a first telephone means to a second telephone means.
- the call has associated thereto calling line identification (CLID) information.
- CLID calling line identification
- the second telephone means provides access to the Internet-enabled computing device.
- the validation application on the Internet-enabled computing device, compares the CLID information to the user-specific information.
- Method 200 further comprises, at step 208 , validating the CLID information using the comparison, and, at step 210 , upon positive validation, logging in the user to the Internet-enabled computing device.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
There is described a method and system for automatically logging in a user to an Internet-enabled computing device. The computing device runs a validation application and has access to information specific to the user, namely user-specific information. The method comprises initiating a call from a first telephone means to a second telephone means. The call has associated thereto calling line identification (CLID) information. The second telephone means provides access to the Internet-enabled computing device. The validation application, on the Internet-enabled computing device, compares the CLID information to the user-specific information. The method further comprises validating the CLID information using the comparison, and upon positive validation, logging in the user to the Internet-enabled computing device.
Description
- This patent application claims priority of the U.S. provisional Patent Application No. 60/807,277, entitled “Auto-Login by Calling Line Identification (CLID)” and filed on Jul. 13, 2006, and of the US provisional Patent Application No. 60/807,287, entitled “Dial-by-Buddy” and filed on Jul. 13, 2006. The specifications and drawings of both applications are hereby incorporated by reference.
- The description relates generally to telephony services. More specifically, the context is Internet telephony.
- Certain information on a user's computer that is connected to the Internet or from a user's internet application or web-based account may be useful to access in cases where the user is either (a) not near his computer, (b) does not have the ability to access his computer over the Internet (e.g., such as by using peer-to-peer software installed on another computer or smart phone) or (c) his computer is closed.
- Accordingly, there is a need for improved Internet telephony services.
- The present invention allows the user to access information on his computer or from a web-based account stored somewhere on the internet via any telephone.
- In one aspect, the present description provides a method for automatically logging in a user to an Internet-enabled computing device. The computing device runs a validation application and has access to information specific to the user, namely user-specific information. The method comprises initiating a call from a first telephone means to a second telephone means. The call has associated thereto calling line identification (CLID) information. The second telephone means provides access to the Internet-enabled computing device. The validation application, on the Internet-enabled computing device, compares the CLID information to the user-specific information. The method further comprises validating the CLID information using the comparison, and upon positive validation, logging in the user to the Internet-enabled computing device.
- In a second aspect, the present description provides a system for automatically logging in a user to an Internet-enabled computing device upon initiation of a call from a first telephone means to a second telephone means. The call has associated thereto calling line identification (CLID) information and the second telephone means is for providing access to the Internet-enabled computing device. The system comprises an input for receiving the CLID information; a database comprising information specific to the user, namely user-specific information; and the Internet-enabled computing device on which is installed a validation application for comparing the CLID information to user-specific information and for validating the CLID information using the comparison. Upon positive validation, the Internet-enabled computing device is for logging in the user to the Internet-enabled computing device.
- Further details of these and other aspects will be apparent from the detailed description and figures included below.
- Reference is now made to the accompanying Figures depicting aspects of the present description, in which:
-
FIG. 1 is a block diagram providing an overview of the environment in which embodiments of an auto-login system and method are implemented; and -
FIG. 2 is a flow chart illustrating an exemplary embodiment of a method for automatically logging in a user. - Turning to
FIG. 1 , there is shown first telephone means 100 that may be linked to second telephone means 102 through anetwork 104. Alternatively, first telephone means 100 may be linked to second telephone means 102 through IP-basednetwork 114. The links between first telephone means 100 and second telephone means 102 can be wire-based or wireless.Network 104 can be any type of network adapted to communicate with first telephone means 100 and second telephone means 102 such as a Public Switched Telephone Network (PSTN), an Internet Protocol (IP) network or any combination of the two. -
FIG. 1 further shows Internet-enabledcomputing device 106 in communication with second telephone means 102 anddatabase 108. Internet-enabledcomputing device 106 is in communication with IP-based network 114 (e.g. the Internet). - The auto-login system 110 (also referred to herein as the system for automatically logging a user) comprises, in an embodiment, Internet-enabled
computing device 106, second telephone means 102 anddatabase 108. The person skilled in the art will understand that it is not essential that Internet-enabledcomputing device 106, second telephone means 102 anddatabase 108 be embodied in a single machine or even in a single location. The components ofsystem 110 can be in various machines or in various locations. - Internet-enabled
computing device 106 is shown ashosting validation application 112 which will be discussed in further detail below. - In an embodiment, second telephone means 102 is an
Internet telephone application 116 installed on Internet-enabledcomputing device 106. -
Validation application 112 allows a user to access information available on the user's computer (e.g., Internet-enabled computing device 106) or Internet 114, by dialling in from a phone (e.g., first telephone means 100) associated with a specific phone number. The present method and system use calling line identification (CLID) information associated with an incoming call to establish the identity of the user. The CLID information can pertain to a telephone (also referred to herein as first telephone means 100) likely or expected to be used by the user, which can include a Public Switched Telephone Network (PSTN) phone or a mobile phone or a Voice over Internet Protocol (VoIP) phone. - In an example,
validation application 112 runs on an Internet-enabledcomputing device 106 that can be the user's home computer or a device which can be hosted elsewhere. One non-limiting example of avalidation application 112 can be installed together with an Internet telephony application 116 (e.g., Skype) on a user's Internet-enabledcomputing device 106. Also stored on the Internet-enabledcomputing device 106 is user-specific information, such as account credentials for a web-based account, or a “.PST” file for use in Microsoft Outlook. - After a call is received at the user's VoIP number (e.g., “Skype-in” when the Internet telephony software is Skype) from any phone and handled by the
Internet telephony application 116, thevalidation application 112 intervenes and recognizes that the user has himself dialled his own VoIP number (e.g., based on calling line identification—CLID). An authentication step may be provided to confirm the identity of the user and ensure that further access is permitted. - In accordance with an aspect of the method, an authorized user first registers an association between that user and a specific telephone number (or plurality of telephone numbers) that the user expects to use (i.e., the telephone number of first telephone means 102) for placing a call to the second telephone means 104. It is therefore understood that a user can setup a plurality of first telephone means 102 even though it is not shown as such on
FIG. 1 . - The telephone number is stored in
database 108 accessible tovalidation application 112. Optionally, authentication credentials (e.g., password or PIN) may also be stored indatabase 108. When the authorized user dials his own VoIP number (i.e., that of the second telephone means 104), the user will reach the Internet telephone application 116 (e.g., a VoIP application) running on the computer. At this point, the validation application intervenes and obtains the CLID information, e.g., by requesting it from the VoIP application. The validation application compares the CLID information to the specific telephone number to determine whether the person dialling the call is the authorized user. - At this point, the authorized user is automatically “logged in”. In a first non-limiting example, the authorized user is logged into a local application (e.g., Microsoft Outlook, MSN Messenger, etc. not shown) that utilizes user-specific information locally stored in
database 108. In a second non-limiting example,validation application 112 triggers opening of an Internet session (e.g., Yahoo voice, Hotmail, etc.) with a target web site. The validation application accesses the account credentials associated with the authorized user and transfers them to the web site, thus allowing the authorized user to gain access (i.e., log in) to an Internet-accessible account via the web site. - In some embodiments, despite recognition of the CLID information as being associated with the authorized user, the caller may nevertheless be asked to authenticate himself by providing a password or PIN stored in
database 108. - For additional security, when the password is used for an Internet application such as Skype, it is possible to avoid keeping the password in any database or on any device. The password is interactively asked to the user when needed and passed directly to the application login along with his user name. If the application logs in with no password error, it is thus verified that the user entered the correct password and is valid.
- If CLID information is present but corresponds to a telephone number that is not in
database 108, there is no automatic user login. Rather, the caller may be prompted to enter certain additional credentials. - If no CLID information is present, then either it is not possible for the caller to log in or it is possible for the caller to log in by providing a set of credentials including, possibly, entry of the specific telephone number.
- Thus, the user may access Internet-related functions, such as Internet voice mail and email, using any regular telephone. Other functions are also possible, such as Internet telephony using the user's own computer as a bridge.
- Now turning to
FIG. 2 , there is shown an embodiment of themethod 200 for automatically logging in a user to an Internet-enabled computing device. As stated earlier, the Internet-enabled computing device running a validation application and has access to information specific to the user, namely user-specific information. -
Method 200 comprises, atstep 202, initiating a call from a first telephone means to a second telephone means. The call has associated thereto calling line identification (CLID) information. - At
step 204, the second telephone means provides access to the Internet-enabled computing device. Atstep 206; the validation application, on the Internet-enabled computing device, compares the CLID information to the user-specific information. -
Method 200 further comprises, atstep 208, validating the CLID information using the comparison, and, atstep 210, upon positive validation, logging in the user to the Internet-enabled computing device. - The above description is meant to be exemplary only, and one skilled in the art will recognize that changes may be made to the embodiments described without department from the scope of the invention disclosed. Modifications which fall within the scope of the present invention will be apparent to those skilled in the art, in light of a review of this disclosure, and such modifications are intended to fall within the appended claims.
Claims (26)
1. A method for automatically logging in a user, using a first telephone means, to an Internet-enabled computing device, the computing device onto which is installed a validation application having access to information specific to the user, namely user-specific information, the method comprising:
initiating a call from the first telephone means to the Internet-enabled computing device, the call having associated thereto calling line identification (CLID) information;
the validation application, on the Internet-enabled computing device, comparing the CLID information to the user-specific information;
validating the CLID information using the comparison; and
upon positive validation, logging in the user to the Internet-enabled computing device.
2. The method of claim 1 , further comprising, prior to initiating the call between the first telephone means and the Internet-enabled computing device, the user registering information identifying the first telephone means in a database accessible to the Internet-enabled computing device.
3. The method of claim 2 , wherein the registering further comprises registering an association between the user and one or more specific telephone numbers that the user expects to use.
4. The method of claim 2 , wherein the registering further comprises registering authentication credentials.
5. The method of claim 4 , further comprising, prior to the validation, performing an authentication using the authentication credentials to confirm the identity of the user.
6. The method of claim 4 , wherein when the CLID information cannot be validated, the method further comprises prompting the user to input authentication credentials, comparing the user-inputted authentication credentials to the registered authentication credentials, and validating the user-inputted authentication credentials.
7. The method of claim 1 , wherein the first telephone means comprises one of a Public Switched Telephone Network (PSTN) phone or a mobile phone or a Voice over Internet Protocol (VoIP) phone.
8. The method of claim 1 , wherein the Internet-enabled computing device comprises a second telephone means comprising an Internet telephone application installed on the computing device.
9. The method of claim 8 , wherein the second telephone means has a Voice over Internet Protocol (VoIP) number associated to the user.
10. The method of claim 1 , further comprising, prior to the validation, obtaining authentication information from the user and using the authentication information for performing an authentication to confirm the identity of the user.
11. The method of claim 1 , wherein the logging in comprises logging the user into a local application on the computing device.
12. The method of claim 11 , wherein the logging comprises triggering the opening of an Internet session with a target web site.
13. The method of claim 12 , wherein the validation application is further for accessing the account credentials associated with the authorized user and transferring the account credentials to the target web site, thus allowing the authorized user to gain access to an Internet-accessible account via the target web site.
14. A system for automatically logging in a user to an Internet-enabled computing device upon initiation of a call from a first telephone means to a second telephone means, the call having associated thereto calling line identification (CLID) information, the second telephone means for providing access to the Internet-enabled computing device, the system comprising:
an input for receiving the CLID information;
a database for storing information specific to the user, namely user-specific information; and
the Internet-enabled computing device on which is installed a validation application for comparing the CLID information to user-specific information and for validating the CLID information using the comparison, and, upon positive validation, the Internet-enabled computing device for logging in the user to the Internet-enabled computing device.
15. The system of claim 14 , further comprising another input for receiving user registration information prior to initiating the call between the first telephone means and the Internet-enabled computing device, the user registration information identifying the first telephone means.
16. The system of claim 15 , wherein the user registration information comprises an association between the user and one or more specific telephone numbers that the user expects to use.
17. The system of claim 15 , wherein the user registration information further comprises registering authentication credentials.
18. The system of claim 17 , wherein the Internet-enabled computing device further comprises an authentication device for performing an authentication using the authentication credentials to confirm the identity of the user prior to the Internet-enabled computing device validating the CLID information.
19. The system of claim 17 , wherein the Internet-enabled computing device further comprises a prompting device for prompting the user to input authentication credentials when the CLID information cannot be validated, a comparator for comparing the user-inputted authentication credentials to the registered authentication credentials, and a validating device for validating the user-inputted authentication credentials.
20. The system of claim 14 , wherein the first telephone means comprises one of a Public Switched Telephone Network (PSTN) phone or a mobile phone or a Voice over Internet Protocol (VoIP) phone.
21. The system of claim 14 , wherein the Internet-enabled computing device comprises a second telephone means comprising an Internet telephone application installed on the computing device.
22. The system of claim 21 , wherein the second telephone means has a Voice over Internet Protocol (VoIP) number associated to the user.
23. The system of claim 14 , further comprising an authentication device for obtaining authentication information from the user and using the authentication information for performing an authentication to confirm the identity of the user prior to the validating of the CLID information
24. The method of claim 14 , wherein Internet-enabled computing device further comprises a local application to which the user is to be logged.
25. The method of claim 24 , wherein the local application comprises a trigger mechanisms for opening an Internet session with a target web site.
26. The method of claim 25 , wherein the validation application comprises a validation application for accessing account credentials associated with the user upon the positive validation, and for transferring the account credentials to the target web site, thus allowing the user to gain access to an Internet-accessible account via the target web site.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/826,105 US20080046969A1 (en) | 2006-07-13 | 2007-07-12 | Method and system for auto-login by calling line identification |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US80728706P | 2006-07-13 | 2006-07-13 | |
US80727706P | 2006-07-13 | 2006-07-13 | |
US11/826,105 US20080046969A1 (en) | 2006-07-13 | 2007-07-12 | Method and system for auto-login by calling line identification |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080046969A1 true US20080046969A1 (en) | 2008-02-21 |
Family
ID=38922884
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/826,104 Expired - Fee Related US8135000B2 (en) | 2006-07-13 | 2007-07-12 | Methods and systems for selecting a buddy from a buddy list and for placing call to a buddy |
US11/826,105 Abandoned US20080046969A1 (en) | 2006-07-13 | 2007-07-12 | Method and system for auto-login by calling line identification |
US13/417,742 Expired - Fee Related US9036798B2 (en) | 2006-07-13 | 2012-03-12 | Methods and systems for selecting a buddy from a buddy list and for placing call to a buddy |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/826,104 Expired - Fee Related US8135000B2 (en) | 2006-07-13 | 2007-07-12 | Methods and systems for selecting a buddy from a buddy list and for placing call to a buddy |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/417,742 Expired - Fee Related US9036798B2 (en) | 2006-07-13 | 2012-03-12 | Methods and systems for selecting a buddy from a buddy list and for placing call to a buddy |
Country Status (3)
Country | Link |
---|---|
US (3) | US8135000B2 (en) |
CA (2) | CA2658057C (en) |
WO (2) | WO2008006214A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8429546B2 (en) | 2010-06-11 | 2013-04-23 | Microsoft Corporation | Creating task sessions |
US8434135B2 (en) | 2010-06-11 | 2013-04-30 | Microsoft Corporation | Creating and launching a web application with credentials |
US8595551B2 (en) | 2010-06-11 | 2013-11-26 | Microsoft Corporation | Web application transitioning and transient web applications |
US8671384B2 (en) | 2010-06-11 | 2014-03-11 | Microsoft Corporation | Web application pinning including task bar pinning |
US8793650B2 (en) | 2010-06-11 | 2014-07-29 | Microsoft Corporation | Dynamic web application notifications including task bar overlays |
US8863001B2 (en) | 2010-06-11 | 2014-10-14 | Microsoft Corporation | Web application home button |
US9164671B2 (en) | 2010-06-11 | 2015-10-20 | Microsoft Technology Licensing, Llc | Web application navigation domains |
US9633659B1 (en) * | 2016-01-20 | 2017-04-25 | Motorola Mobility Llc | Method and apparatus for voice enrolling an electronic computing device |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100913099B1 (en) * | 2008-01-07 | 2009-08-21 | 엘지전자 주식회사 | A method for scheduling of distributed virtual resource blocks |
US20100318376A1 (en) * | 2009-06-12 | 2010-12-16 | Microsoft Corporation | Message-passing protocol between entities having dissimilar capabilities |
GB0917159D0 (en) | 2009-09-30 | 2009-11-11 | British Telecomm | Method of configuring a device for communications service activation |
WO2019107997A1 (en) * | 2017-11-30 | 2019-06-06 | 엘지전자 주식회사 | Method and device for processing video signal |
CN111818013B (en) * | 2020-06-04 | 2022-06-21 | 上海掌门科技有限公司 | Method and device for adding friends |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5181238A (en) * | 1989-05-31 | 1993-01-19 | At&T Bell Laboratories | Authenticated communications access service |
US20020007462A1 (en) * | 2000-07-11 | 2002-01-17 | Masaki Omata | User authentication system |
US20020154626A1 (en) * | 2001-02-22 | 2002-10-24 | Ryu Sang Y | Telephony service system using a voice over internet protocol based on a network |
US20020196279A1 (en) * | 1995-11-13 | 2002-12-26 | Marc Bloomfield | Interacting with software applications displayed in a web page |
US20040230647A1 (en) * | 2003-05-13 | 2004-11-18 | Jai Rawat | Method and system of capturing data for automating internet interactions |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4817129A (en) * | 1987-03-05 | 1989-03-28 | Telac Corp. | Method of and means for accessing computerized data bases utilizing a touch-tone telephone instrument |
US5003595A (en) * | 1989-08-29 | 1991-03-26 | At&T Bell Laboratories | Secure dial access to computer systems |
US5204894A (en) * | 1990-11-09 | 1993-04-20 | Bell Atlantic Network Services, Inc. | Personal electronic directory |
US6009082A (en) * | 1993-01-08 | 1999-12-28 | Multi-Tech Systems, Inc. | Computer-based multifunction personal communication system with caller ID |
US5594784A (en) * | 1993-04-27 | 1997-01-14 | Southwestern Bell Technology Resources, Inc. | Apparatus and method for transparent telephony utilizing speech-based signaling for initiating and handling calls |
JPH0856262A (en) * | 1994-08-11 | 1996-02-27 | Hitachi Ltd | Telephone exchange and telepnone exchange network using the exchange |
US5901214A (en) * | 1996-06-10 | 1999-05-04 | Murex Securities, Ltd. | One number intelligent call processing system |
US5901203A (en) * | 1996-06-28 | 1999-05-04 | Distributed Software Development, Inc. | Computer-based system and method for identifying an unidentified caller |
FI104876B (en) * | 1996-11-12 | 2000-04-14 | Nokia Mobile Phones Ltd | System and method for retrieving data from a database |
US6404876B1 (en) * | 1997-09-25 | 2002-06-11 | Gte Intelligent Network Services Incorporated | System and method for voice activated dialing and routing under open access network control |
US6418472B1 (en) * | 1999-01-19 | 2002-07-09 | Intel Corporation | System and method for using internet based caller ID for controlling access to an object stored in a computer |
WO2000057621A1 (en) * | 1999-03-19 | 2000-09-28 | Estara, Inc. | Public web phone system |
CA2288573A1 (en) * | 1999-11-08 | 2001-05-08 | John C. Myers | Telephone based access to instant messaging |
US6760580B2 (en) * | 2000-03-06 | 2004-07-06 | America Online, Incorporated | Facilitating instant messaging outside of user-defined buddy group in a wireless and non-wireless environment |
US7162649B1 (en) * | 2000-06-30 | 2007-01-09 | Internet Security Systems, Inc. | Method and apparatus for network assessment and authentication |
US6868544B2 (en) * | 2000-12-08 | 2005-03-15 | Telcordia Technologies, Inc. | Method and system for general-purpose interactive notifications |
AUPR690701A0 (en) * | 2001-08-10 | 2001-08-30 | Redpoint Pty Ltd | A system and method for customising call alerts |
US7046994B1 (en) * | 2002-02-01 | 2006-05-16 | Microsoft Corporation | System and method for associating a contact with a call ID |
US6937715B2 (en) * | 2002-09-26 | 2005-08-30 | Nortel Networks Limited | Contact center management |
US7206389B1 (en) * | 2004-01-07 | 2007-04-17 | Nuance Communications, Inc. | Method and apparatus for generating a speech-recognition-based call-routing system |
US8027335B2 (en) | 2004-05-05 | 2011-09-27 | Prodea Systems, Inc. | Multimedia access device and system employing the same |
US7656870B2 (en) | 2004-06-29 | 2010-02-02 | Damaka, Inc. | System and method for peer-to-peer hybrid communications |
US8195952B2 (en) * | 2004-12-14 | 2012-06-05 | International Business Machines Corporation | System and method of facilitating the identification of a computer on a network |
US20070281680A1 (en) * | 2006-06-05 | 2007-12-06 | Vish Raju | Method and system for extending services to cellular devices |
CA2664003C (en) * | 2006-09-20 | 2015-11-03 | Mobivox Corporation | Method and system for triggering internet applications using messages |
-
2007
- 2007-07-12 WO PCT/CA2007/001236 patent/WO2008006214A1/en active Application Filing
- 2007-07-12 US US11/826,104 patent/US8135000B2/en not_active Expired - Fee Related
- 2007-07-12 CA CA2658057A patent/CA2658057C/en not_active Expired - Fee Related
- 2007-07-12 US US11/826,105 patent/US20080046969A1/en not_active Abandoned
- 2007-07-12 WO PCT/CA2007/001235 patent/WO2008006213A1/en active Search and Examination
- 2007-07-12 CA CA002658056A patent/CA2658056A1/en not_active Abandoned
-
2012
- 2012-03-12 US US13/417,742 patent/US9036798B2/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5181238A (en) * | 1989-05-31 | 1993-01-19 | At&T Bell Laboratories | Authenticated communications access service |
US20020196279A1 (en) * | 1995-11-13 | 2002-12-26 | Marc Bloomfield | Interacting with software applications displayed in a web page |
US20020007462A1 (en) * | 2000-07-11 | 2002-01-17 | Masaki Omata | User authentication system |
US20020154626A1 (en) * | 2001-02-22 | 2002-10-24 | Ryu Sang Y | Telephony service system using a voice over internet protocol based on a network |
US20040230647A1 (en) * | 2003-05-13 | 2004-11-18 | Jai Rawat | Method and system of capturing data for automating internet interactions |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9021469B2 (en) | 2010-06-11 | 2015-04-28 | Microsoft Technology Licensing, Llc | Web application pinning including task bar pinning |
US8434135B2 (en) | 2010-06-11 | 2013-04-30 | Microsoft Corporation | Creating and launching a web application with credentials |
US8595551B2 (en) | 2010-06-11 | 2013-11-26 | Microsoft Corporation | Web application transitioning and transient web applications |
US8671384B2 (en) | 2010-06-11 | 2014-03-11 | Microsoft Corporation | Web application pinning including task bar pinning |
US8793650B2 (en) | 2010-06-11 | 2014-07-29 | Microsoft Corporation | Dynamic web application notifications including task bar overlays |
US8863001B2 (en) | 2010-06-11 | 2014-10-14 | Microsoft Corporation | Web application home button |
US8429546B2 (en) | 2010-06-11 | 2013-04-23 | Microsoft Corporation | Creating task sessions |
US9069636B2 (en) | 2010-06-11 | 2015-06-30 | Microsoft Technology Licensing, Llc | Dynamic web application notifications including task bar overlays |
US9164671B2 (en) | 2010-06-11 | 2015-10-20 | Microsoft Technology Licensing, Llc | Web application navigation domains |
US9367636B2 (en) | 2010-06-11 | 2016-06-14 | Microsoft Technology Licensing, Llc | Web application home button |
US9588754B2 (en) | 2010-06-11 | 2017-03-07 | Microsoft Technology Licensing, Llc | Dynamic web application notifications including task bar overlays |
US10140107B2 (en) | 2010-06-11 | 2018-11-27 | Microsoft Technology Licensing, Llc | Dynamic web application notifications including task bar overlays |
US9633659B1 (en) * | 2016-01-20 | 2017-04-25 | Motorola Mobility Llc | Method and apparatus for voice enrolling an electronic computing device |
Also Published As
Publication number | Publication date |
---|---|
US20080013699A1 (en) | 2008-01-17 |
US20120170723A1 (en) | 2012-07-05 |
CA2658057A1 (en) | 2008-01-17 |
CA2658056A1 (en) | 2008-01-17 |
US8135000B2 (en) | 2012-03-13 |
WO2008006214A1 (en) | 2008-01-17 |
CA2658057C (en) | 2013-04-23 |
US9036798B2 (en) | 2015-05-19 |
WO2008006213A1 (en) | 2008-01-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080046969A1 (en) | Method and system for auto-login by calling line identification | |
US8006283B2 (en) | Method and system for triggering internet applications using messages | |
US20070220275A1 (en) | WEB AUTHORIZATION BY AUTOMATED INTERACTIVE PHONE OR VoIP SESSION | |
EP3008935B1 (en) | Mobile device authentication in heterogeneous communication networks scenario | |
US8744053B2 (en) | Methods, apparatus, and computer program products for providing dynamic replacement communication identification service | |
US11082555B2 (en) | Method for associating a PBX extension with a user account of a cloud service application | |
US8194651B2 (en) | Method and apparatus for user authentication | |
KR101630913B1 (en) | A method, device and system for verifying communication sessions | |
US9860228B2 (en) | Pre-delivery authentication | |
JP2006295673A (en) | Call system, proxy dial server device, proxy dial method used therefor, and program thereof | |
EP2222065B1 (en) | Secure feature access from an off-pbx telephone | |
CN107872588B (en) | Call processing method, related device and system | |
US20060143705A1 (en) | User authentication in a conversion system | |
EP2761847B1 (en) | Method and system for managing the communication between two users | |
JP2002229952A (en) | User authentication system and user authentication method | |
CN103916403A (en) | Method for logging in to client side omitting password entering and supporting SIP | |
EP1146712A1 (en) | Authentication in telecommunication system | |
KR101408590B1 (en) | Sip communication system and control method thereof, lan access apparatus comprised the system and control method thereof | |
JP4575836B2 (en) | Relay server | |
EP2845380A1 (en) | Method and system for call setup | |
JP2006023998A (en) | Authentication apparatus, portable telephone authentication system, method for authenticating user, and computer program | |
KR20120005593A (en) | System and method for user authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MOBIVOX CORPORATION, CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:REIHER, ERIC;BOUVIER, HENRI;REEL/FRAME:021793/0264 Effective date: 20081003 |
|
AS | Assignment |
Owner name: SASSE TECHNOLOGIES, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOBIVOX CORPORATION;REEL/FRAME:023418/0672 Effective date: 20091015 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |