1. Field of the Invention
The present invention relates generally to an improved data processing system and in particular to a method and apparatus for processing and displaying messages. Still more particularly, the present invention relates to a computer implemented method, apparatus, and computer-useable code for securing and retrieving instant messages.
2. Description of the Related Art
Instant messaging is an online chat medium, allowing users to communicate with each other and to collaborate in real-time over a network data processing system. Instant messaging is commonly used over the Internet. Instant messaging applications monitor and report the status of users that have established each other as online contacts. This information is typically presented to a user in a window. Instant messaging applications also are often used by users conducting business. By utilizing instant messaging, business users can view each other's availability and initiate a text conversation with colleagues or customers when a desired contact becomes available. Millions of users communicate using instant messaging systems every day. With instant messaging becoming an important part of both personal and business communications, functionality and usability enhancements are important to the continued success of this type of communication tool. Both in business and personal use, users often find themselves sending and receiving sensitive information through an instant message channel. Currently, the sender of such information has no control over the usage of a sensitive message or any message once the message has been sent. Instant messages may be copied and pasted into a document by the recipient either intentionally or accidentally against the wishes of the sender. Additionally, these messages may be sent to an unintended and open computer display that may be read by any observer.
The present invention provides a computer implemented method, apparatus, and computer usable code for managing instant messages. An instant message is received at a client. A set of parameters in the instant message is identified. The instant message on a display in the client is presented, and the instant message is removed from the display after a period of time defined by the set of parameters.
The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, however, as well as a preferred mode of use, further objectives and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, wherein:
With reference now to the figures,
In the depicted example, server 104 and server 106 connect to network 102 along with storage unit 108. In addition, clients 110, 112, and 114 connect to network 102. These clients 110, 112, and 114 may be, for example, personal computers or network computers. In the depicted example, server 104 provides data, such as boot files, operating system images, and applications to clients 110, 112, and 114. Clients 110, 112, and 114 are clients to server 104 in this example. Network data processing system 100 may include additional servers, clients, and other devices not shown.
In the depicted example, network data processing system 100 is the Internet with network 102 representing a worldwide collection of networks and gateways that use the Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols to communicate with one another. At the heart of the Internet is a backbone of high-speed data communication lines between major nodes or host computers, consisting of thousands of commercial, government, educational and other computer systems that route data and messages. Of course, network data processing system 100 also may be implemented as a number of different types of networks, such as for example, an intranet, a local area network (LAN), or a wide area network (WAN).
With reference now to
In the depicted example, data processing system 200 employs a hub architecture including north bridge and memory controller hub (MCH) 202 and south bridge and input/output (I/O) controller hub (ICH) 204. Processing unit 206, main memory 208, and graphics processor 210 are connected to north bridge and memory controller hub 202. Graphics processor 210 may be connected to north bridge and memory controller hub 202 through an accelerated graphics port (AGP).
In the depicted example, local area network (LAN) adapter 212 connects to south bridge and I/O controller hub 204. Audio adapter 216, keyboard and mouse adapter 220, modem 222, read only memory (ROM) 224, hard disk drive (HDD) 226, CD-ROM drive 230, universal serial bus (USB) ports and other communications ports 232, and PCI/PCIe devices 234 connect to south bridge and I/O controller hub 204 through bus 238 and bus 240. PCI/PCIe devices may include, for example, Ethernet adapters, add-in cards and PC cards for notebook computers. PCI uses a card bus controller, while PCIe does not. ROM 224 may be, for example, a flash binary input/output system (BIOS).
Hard disk drive 226 and CD-ROM drive 230 connect to south bridge and I/O controller hub 204 through bus 240. Hard disk drive 226 and CD-ROM drive 230 may use, for example, an integrated drive electronics (IDE) or serial advanced technology attachment (SATA) interface. Super I/O (SIO) device 236 may be connected to south bridge and I/O controller hub 204.
An operating system runs on processing unit 206 and coordinates and provides control of various components within data processing system 200 in
As a server, data processing system 200 may be, for example, an IBM eServer™ pSeries® computer system, running the Advanced Interactive Executive (AIX®) operating system or LINUX operating system (eServer, pSeries and AIX are trademarks of International Business Machines Corporation in the United States, other countries, or both while Linux is a trademark of Linus Torvalds in the United States, other countries, or both). Data processing system 200 may be a symmetric multiprocessor (SMP) system including a plurality of processors in processing unit 206. Alternatively, a single processor system may be employed.
Instructions for the operating system, the object-oriented programming system, and applications or programs are located on storage devices, such as hard disk drive 226, and may be loaded into main memory 208 for execution by processing unit 206. The processes for embodiments of the present invention are performed by processing unit 206 using computer usable program code, which may be located in a memory such as, for example, main memory 208, read only memory 224, or in one or more peripheral devices 226 and 230.
Those of ordinary skill in the art will appreciate that the hardware in
In some illustrative examples, data processing system 200 may be a personal digital assistant (PDA), which is configured with flash memory to provide non-volatile memory for storing operating system files and/or user-generated data.
A bus system may be comprised of one or more buses, such as bus 238 or bus 240 as shown in
The aspects of the present invention provide a computer implemented method, apparatus, and computer usable code for a sender of an instant message to cause the message to self-destruct at the end of some specific time interval. Messages in a chat session are not all sensitive, and typically messages should not persist for an extended amount of time. As a result, the illustrative examples involve the sender indicating that a message should be self-destructed or presented only for a limited amount of time on a message by message basis. Depending upon the implementation, an entire chat session may be designated for this type of handling.
Turning now to
Depending upon the particular instant messaging system, instant messaging server process 308 may only be involved in providing an indication of when particular users are online and for establishing initial contacts, while users contacting other users already on a buddy list may contact those users directly after seeing that a particular user is online. Instant messaging server process 308 may be located on a server, such as data processing system 200 in
In these illustrative examples, the different users registered to instant messaging system 300 are stored in user database 310. This user database provides information needed to search for and find other users as well as contact users when they are online.
The different aspects of the present invention may be implemented within the components in instant messaging system 300. In particular, the different instant messaging clients may contain the processes necessary to create messages that will self-destruct after a selected amount of time. The message self-destructs when the message should no longer be read by the recipient of the message.
The self-destruction of a message may include, for example, the deletion of the message from the message store of the instant messaging client for the user. Alternatively, the self-destruction of a message may involve scrambling or encoding the message. Each client also includes processes for handling received messages that should be self-destructed. In the event that messages are handled or stored on instant messaging server 308, instant messaging server 308 may contain processes to provide for the self-destruction of messages on the different clients.
Turning next to
In the illustrative example, instant messaging application 400 processes messages, such as message 402, received from users located on remote data processing systems. As messages are received, these messages are presented in dialog windows 404. Additionally, dialog windows 404 provide an interface for a user to input text to send messages to other users.
Contact and control window 406 is presented by instant messaging application 400 to provide the user with a list of user names, as well as other information. Contact and control window 406 also provides an interface to allow a user to set different preferences. For example, the user may set passwords required to access different names used in instant messaging sessions.
Also, a user may employ contact and control window 406 to set other preferences, such as colors and fonts used in instant messaging application 400. These preferences also may include whether a picture is to be sent when a session is initiated with another user. Depending on the implementation, the preference may be set to allow a user who receives messages to retrieve images of the senders from a remote database or a local cache.
Further, a list of names presented by contact and control window 406 are stored in contact list 408 in these examples. Additional user or screen names may be added to or deleted from contact list 408. This contact list is employed in presenting the list of names within contact and control window 406.
In the illustrative examples, instant messaging application 400 includes processes to create and handle messages that are to be self-destructed. For example, instant messaging application 400 includes message store 410 into vault 412. Message store 410 is typically used to store messages received during a chat session or message exchange between users.
Instant messaging application 400 identifies messages that have been marked for self-destruction after a selected period of time. After the selected period of time for a message is reached, that message in message store 410 is self-destructed. As a result, the user is unable to view that particular message. As previously mentioned, the self-destruction of a message may involve, for example, deletion of the message from message store 410. Alternatively, the message in message store 410 may be encrypted. Additionally, if a message has been scrambled or encrypted, the message may be then unencrypted through the use of an appropriate password or key by the user.
Further, instant messaging application 400 may display sensitive messages that are marked for self-destruction in the context of a chat session. Alternatively, a sensitive message that is marked for self-destruction may be displayed in a separate window within dialog windows 404 outside of the confines of the standard or typical chat window. In either instance, the user may indicate the length of the time that the recipient may view a message either “on the fly” or as part of a preference setting through contact in control window 406 in these examples. Further, both of these different examples used to display sensitive messages may allow the user the option to display or not display a self-destruct countdown with the message. This option may be set as a preference or at the time the message is sent.
A user may retrieve or reconstruct a self-destructed message in these examples. Such a feature is useful when a user may be away from the client application when the message has been received. In the illustrative examples, the recipient may obtain or reconstruct a self-destructed message by accessing a secure file buffer, such as vault 412, containing the self-destructed messages from the sender. In these examples, vault 412 is password protected. Alternatively, the user may use a password to unscramble a scrambled version or encrypted version of the self-destructed message displayed in the chat window. Additionally, a separate chat session or dialog may be employed through which the sensitive information is redisplayed then re-self-destructed in the manner originally designated. The second chat session allows the user to replay the messages that the user may have missed or wish to review again.
Further, the different aspects of the present invention allow recipient to be prompted to retrieve the message if the recipient has not responded to that message within the self-destruct time limit. Alternatively, the user may retrieve messages by issuing a command through contact and control window 406 to instant messaging application 400. This retrieval of self-destructed messages also may be initiated by selecting or clicking on a status information message displayed in dialog windows 404. For example, a status information message “the message has self-destructed” may replace the self-destructed message. By selecting the status message, the retrieval or reconstruction of self-destructed messages may occur. An example of another mechanism by which the retrieval may occur is through selecting the scrambled or encrypted version of the message on the chat window.
Turning now to
In these illustrative examples, a self-destruct message may be indicated by selecting check box 512. The time after which a message will self-destruct may be selected by user through controls 514 and 516. Control 514 is used to select a numerical value. In this example, the numerical value is 10. Control 516 is used to select the type of time period. In these examples, the time period is in seconds. As a result, the message will self-destruct-after ten seconds if check box 512 is selected. Check box 518 is used to set a preference as to whether a countdown timer will be displayed in association with a message that is to be self-destructed. Check box 520 is used to select a preference as to whether a message may be retrieved or reconstructed at a later time.
In this example in
In
Next, in
Turning to
Turning now to
This example is in contrast to those shown in
In
Turning next to
Alternatively, instead of using dialog window 800, the user may select the status message indicating the message has been self-destructed. For example, the user may select status message 546 in
With reference to
Turning to
Turning now to
As can be seen from
In
The process illustrated in
The self-destruct option may be selected in a number of different ways. For example, a check box for the option may be selected, such as check box 512 in
Turning to
The process begins by receiving a message (step 1300). The message is then parsed (step 1302). A determination is made as to whether self-destruct parameters are present in the parsed message (step 1304). If self-destruct parameters are present, the message is displayed using the self-destruct parameters (step 1306), with the process terminating thereafter. In step 1304, if the self-destruct parameters are absent in the message, the message is displayed normally step (1308), with the process terminating thereafter. In step 1306, the display the message using self-destruct parameters vary depending upon the particular implementation.
The different illustrations in
Turning now to
The process begins by displaying the receiving the displayed message in (step 1400). A determination is made as to whether a countdown timer display has been enabled (step 1402). If a countdown timer has been enabled, the process displays the countdown timer (step 1404). This countdown timer may be displayed in the section of the chat window in which the message is presented. Alternatively, this countdown may be displayed in other portions of the chat window or in a separate dialog depending upon the particular implementation.
The process then waits for the time limit for the message to elapse (step 1406). Once the time limit has been exceeded, the process self-destructs the message (step 1408), with the process terminating thereafter. Self-destruction of the message may include, for example, removal of the message from the chat window. The self-destruction also may include scrambling or encrypting the message within the chat window. If a message is removed or encrypted, a status message also may be presented to the user indicating that the message has self-destructed.
Turning now to
The process begins by removing the message from display (step 1500). Thereafter, a status message is displayed (step 1502). A determination is made as to whether the message can be retrieved or reconstructed at a later time (step 1504). This determination in step 1504 is performed by examining parameter that indicates whether a message can be retrieved at a later time. Additionally, this step may include determining whether a reply to the message has been made. Messages without replies may be saved for later retrieval in case the recipient had not read the messages. If the message can be retrieved, the message is stored in a vault (step 1506), with the process terminating thereafter. This vault is, for example, vault 412 in
Turning now to
The process begins by removing the message from the display (step 1600). Thereafter, the message is encrypted (step 1602). Thereafter, the encrypted form of the message is displayed (step 1604), and a status message is displayed (step 1606) with the process terminating thereafter.
With reference to
The process begins by receiving a request to retrieve a self-destructed message (step 1700). This request may be received in a number of different ways depending upon the particular implementation. For example, the user may select the status message or an encrypted form of the message in a chat window. Additionally, the user may select the command from a menu to initiate the retrieval or a dialog may be displayed to the user when the user has not responded to one or more self-destructed messages as illustrated in
The process then prompts the user for a password (step 1702). A determination is made as to whether the password is correct (step 1704). If the password is correct, the self-destructed message is displayed to the user (step 1706), with the process terminating thereafter. Otherwise, the process terminates without displaying the self-destructed message. The display of the self-destructed message may be performed using a number of different mechanisms. For example, the message may be displayed in the chat window or in a separate dialog from the chat window.
Turning next to
With reference to
The examples illustrated in
The aspects of the present invention provide a computer implemented method, apparatus, and computer usable code for securing and retrieving instant messages. The different aspects illustrated in the examples self-destruct the message after a selected amount of time. The self-destruction of a message reduces the possibility that an unauthorized observer may see a message that is presented on a chat window while the user is away. The different aspects of the present invention also allow a user to retrieve messages to view again at a later time. This feature is useful if the user has never seen the message or needs to see the message again after the message has self-destructed.
The invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk—read only memory (CD-ROM), compact disk—read/write (CD-R/W) and DVD.
A data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the system either directly or through intervening I/O controllers.
Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
The description of the present invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention, the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.