The present invention relates to a method and associated system for associating an instant messaging contact with software applications or folders.
Managing communications between users comprises an inaccurate process with little flexibility. Communication management within a system typically includes a manual process. Manually managing communications may be time consuming and require a large amount of resources. Accordingly, there exists a need in the art to overcome at least some of the deficiencies and limitations described herein above.
The present invention provides a method comprising: receiving, by a computer processor of a computing apparatus from a user, a request for access to an instant messaging software application, wherein the computing apparatus comprises a list of contacts associated with the instant messaging software application and the user; enabling for the user, by the computer processor, the instant messaging software application and all contacts of the list of contacts to communicate with the user via the instant messaging software application; enabling for the user, by the computer processor in response to a request from the user, a first specified software application; presenting to the user, by the computer processor in response to the enabling the first specified software application, a first option for allowing only a first group of contacts of the list of contacts to communicate with said user, wherein the first group of contacts are associated with the first specified software application; receiving, by the computer processor from the user, a first command associated with the first option; and performing, by the computer processor in response to the first command, first functions associated with the first command.
The present invention provides a computing system comprising a computer processor coupled to a computer-readable memory unit, the memory unit comprising instructions that when executed by the computer processor implements a method comprising: receiving, by the computer processor from a user, a request for access to an instant messaging software application, wherein the computing apparatus comprises a list of contacts associated with the instant messaging software application and the user; enabling for the user, by the computer processor, the instant messaging software application and all contacts of the list of contacts to communicate with the user via the instant messaging software application; enabling for the user, by the computer processor in response to a request from the user, a first specified software application; presenting to the user, by the computer processor in response to the enabling the first specified software application, a first option for allowing only a first group of contacts of the list of contacts to communicate with the user, wherein the first group of contacts are associated with the first specified software application; receiving, by the computer processor from the user, a first command associated with the first option; and performing, by the computer processor in response to the first command, first functions associated with the first command.
The present invention provides a computer program product, comprising a computer readable storage medium having a computer readable program code embodied therein, the computer readable program code comprising an algorithm that when executed by a computer processor of a computing system implements a method comprising: receiving, by the computer processor from a user, a request for access to an instant messaging software application, wherein the computing apparatus comprises a list of contacts associated with the instant messaging software application and the user; enabling for the user, by the computer processor, the instant messaging software application and all contacts of the list of contacts to communicate with the user via the instant messaging software application; enabling for the user, by the computer processor in response to a request from the user, a first specified software application; presenting to the user, by the computer processor in response to the enabling the first specified software application, a first option for allowing only a first group of contacts of the list of contacts to communicate with the user, wherein the first group of contacts are associated with the first specified software application; receiving, by the computer processor from the user, a first command associated with the first option; and performing, by the computer processor in response to the first command, first functions associated with the first command.
The present invention advantageously provides a simple method and associated system capable of managing communications between users.
1. A system and method for automatically associating specific software applications or folders to instant messaging software for controlling privacy contact lists.
2. Allowing only specified users associated with the specific applications or folders to communicate with a user accessing the specific applications or folders.
3. Allowing only specified users associated with the specific applications or folders to communicate with the user based on location.
4. Allowing only specified users associated with the specific applications or folders to communicate with the user based on specified activities.
System 2 of
The following implementation example describes a process performed by system 2 for automatically associating instant messenger (privacy) contact lists 32 to software applications 24 and/or folders 22:
A user A has access to an instant messenger software application and associated instant messenger contacts divided into groups. Each group of contacts is associated with a different business associated with (e.g., doing business with) user A. For example, a first group contacts is associated with a first company and a second group of contacts is associated with a second company. When user A is working on a specific application or accesses a specific folder in a specific file, system 2 provides a capability to automatically set privacy contact lists based on individuals or groups associated with a specified business and the specific application or specific folder. In this example, user A uses a software application companyA.exe to test certain scenarios for work at company A. Additionally, user A uses a software application companyB.exe for word processing work for company B. An entire output of a multi-week project at company B is a word processing document titled B.wp.
The following steps describe the implementation example enabled by system 2:
1. User A logs into a computer (e.g., any of computers 5a . . . 5n and/or computing system 14) and enables an instant messenger (e.g., instant messenger software application 28).
2. User A checks incoming email and works on communications within his/her department. During these transactions, the instant messenger allows communications between user A and all contacts on user A's contact (privacy) list.
3. User A enables the software application companyA.exe (i.e., to test certain scenarios for work at company A). In this scenario, user A has previously set up a link between a company A instant messenger group of contacts (i.e., of user A's contact (privacy) list) and the software application companyA.exe.
4. As the software application companyA.exe boots up, system 2 presents user A with an option of automatically setting on user A's contact (privacy) list so that only the company A instant messenger group of contacts (i.e., of user A's contact (privacy) list) can communicate with user A online. In response, system 2 presents user A with the following choices:
A. A choice for not automatically setting user A's contact (privacy) list so that only the company A instant messenger group of contacts (i.e., of user A's contact (privacy) list) can communicate with user A online. In this instance, the instant messenger allows communications between user A and all contacts on user A's contact (privacy) list.
B. A choice for automatically setting user A's contact (privacy) list so that only the company A instant messenger group of contacts (i.e., of user A's contact (privacy) list) can communicate with user A online. In this example, user A selects automatically setting the contact (privacy) list to company A contacts.
5. At a later time, user A disables the software application companyA.exe. At this time, the instant messenger presents user A with the option of communicating with all contacts or just the company A contacts. Alternatively, system 2 may be configured so that an automatic selection is made without user A input.
6. At a later time, user A enables the document titled B.wp in software application companyB.exe. In this scenario, user A has previously set up a link between a company A instant messenger group of contacts (i.e., of user A's contact (privacy) list) and the software application companyA.exe.
7. As the software application companyB.exe boots up, system 2 presents user A with an option of automatically setting on user A's contact (privacy) list so that only the company B instant messenger group of contacts (i.e., of user A's contact (privacy) list) can communicate with user A online. In response, system 2 presents user A with the following choices:
A. A choice for not automatically setting user A's contact (privacy) list so that only the company B instant messenger group of contacts (i.e., of user A's contact (privacy) list) can communicate with user A online. In this instance, the instant messenger allows communications between user A and all contacts on user A's contact (privacy) list.
B. A choice for automatically setting user A's contact (privacy) list so that only the company B instant messenger group of contacts (i.e., of user A's contact (privacy) list) can communicate with user A online. In this example, user A selects automatically setting the contact (privacy) list to company B contacts.
8. Additionally, there may be a time in the day when applications or folders are tied back to more than one contact (privacy) group of contacts. For example, the software application companyA.exe and the software application companyB.exe are both enabled. In this case, an additional choice (or drop down menu list) may be presented so that user A may select which groups of contacts remain in communication with user A. Additionally, groups of contacts may be tied to specified folders, locations, and/or specified activities for user A and the groups of contacts.
Still yet, any of the components of the present invention could be created, integrated, hosted, maintained, deployed, managed, serviced, etc. by a service supplier who offers to associate instant messenger (privacy) contact lists to software applications and/or folders. Thus the present invention discloses a process for deploying, creating, integrating, hosting, maintaining, and/or integrating computing infrastructure, comprising integrating computer-readable code into the computer system 90, wherein the code in combination with the computer system 90 is capable of performing a method for associating instant messenger (privacy) contact lists to software applications and/or folders. In another embodiment, the invention provides a business method that performs the process steps of the invention on a subscription, advertising, and/or fee basis. That is, a service supplier, such as a Solution Integrator, could offer to associate instant messenger (privacy) contact lists to software applications and/or folders. In this case, the service supplier can create, maintain, support, etc. a computer infrastructure that performs the process steps of the invention for one or more customers. In return, the service supplier can receive payment from the customer(s) under a subscription and/or fee agreement and/or the service supplier can receive payment from the sale of advertising content to one or more third parties.
While
While embodiments of the present invention have been described herein for purposes of illustration, many modifications and changes will become apparent to those skilled in the art. Accordingly, the appended claims are intended to encompass all such modifications and changes as fall within the true spirit and scope of this invention.