The description relates generally to telephony services. More specifically, the context is Internet telephony.
Certain information on a user's computer that is connected to the Internet or from a user's internet application or web-based account may be useful to access in cases where the user is either (a) not near his computer, (b) does not have the ability to access his computer over the Internet (e.g., such as by using peer-to-peer software installed on another computer or smart phone) or (c) his computer is closed.
Accordingly, there is a need for improved Internet telephony services.
The present invention allows the user to access information on his computer or from a web-based account stored somewhere on the internet via any telephone.
In one aspect, the present description provides a method for automatically logging in a user to an Internet-enabled computing device. The computing device runs a validation application and has access to information specific to the user, namely user-specific information. The method comprises initiating a call from a first telephone means to a second telephone means. The call has associated thereto calling line identification (CLID) information. The second telephone means provides access to the Internet-enabled computing device. The validation application, on the Internet-enabled computing device, compares the CLID information to the user-specific information. The method further comprises validating the CLID information using the comparison, and upon positive validation, logging in the user to the Internet-enabled computing device.
In a second aspect, the present description provides a system for automatically logging in a user to an Internet-enabled computing device upon initiation of a call from a first telephone means to a second telephone means. The call has associated thereto calling line identification (CLID) information and the second telephone means is for providing access to the Internet-enabled computing device. The system comprises an input for receiving the CLID information; a database comprising information specific to the user, namely user-specific information; and the Internet-enabled computing device on which is installed a validation application for comparing the CLID information to user-specific information and for validating the CLID information using the comparison. Upon positive validation, the Internet-enabled computing device is for logging in the user to the Internet-enabled computing device.
Further details of these and other aspects will be apparent from the detailed description and figures included below.
Reference is now made to the accompanying Figures depicting aspects of the present description, in which:
Turning to
The auto-login system 110 (also referred to herein as the system for automatically logging a user) comprises, in an embodiment, Internet-enabled computing device 106, second telephone means 102 and database 108. The person skilled in the art will understand that it is not essential that Internet-enabled computing device 106, second telephone means 102 and database 108 be embodied in a single machine or even in a single location. The components of system 110 can be in various machines or in various locations.
Internet-enabled computing device 106 is shown as hosting validation application 112 which will be discussed in further detail below.
In an embodiment, second telephone means 102 is an Internet telephone application 116 installed on Internet-enabled computing device 106.
Validation application 112 allows a user to access information available on the user's computer (e.g., Internet-enabled computing device 106) or Internet 114, by dialling in from a phone (e.g., first telephone means 100) associated with a specific phone number. The present method and system use calling line identification (CLID) information associated with an incoming call to establish the identity of the user. The CLID information can pertain to a telephone (also referred to herein as first telephone means 100) likely or expected to be used by the user, which can include a Public Switched Telephone Network (PSTN) phone or a mobile phone or a Voice over Internet Protocol (VoIP) phone.
In an example, validation application 112 runs on an Internet-enabled computing device 106 that can be the user's home computer or a device which can be hosted elsewhere. One non-limiting example of a validation application 112 can be installed together with an Internet telephony application 116 (e.g., Skype) on a user's Internet-enabled computing device 106. Also stored on the Internet-enabled computing device 106 is user-specific information, such as account credentials for a web-based account, or a “.PST” file for use in Microsoft Outlook.
After a call is received at the user's VoIP number (e.g., “Skype-in” when the Internet telephony software is Skype) from any phone and handled by the Internet telephony application 116, the validation application 112 intervenes and recognizes that the user has himself dialled his own VoIP number (e.g., based on calling line identification—CLID). An authentication step may be provided to confirm the identity of the user and ensure that further access is permitted.
In accordance with an aspect of the method, an authorized user first registers an association between that user and a specific telephone number (or plurality of telephone numbers) that the user expects to use (i.e., the telephone number of first telephone means 102) for placing a call to the second telephone means 104. It is therefore understood that a user can setup a plurality of first telephone means 102 even though it is not shown as such on
The telephone number is stored in database 108 accessible to validation application 112. Optionally, authentication credentials (e.g., password or PIN) may also be stored in database 108. When the authorized user dials his own VoIP number (i.e., that of the second telephone means 104), the user will reach the Internet telephone application 116 (e.g., a VoIP application) running on the computer. At this point, the validation application intervenes and obtains the CLID information, e.g., by requesting it from the VoIP application. The validation application compares the CLID information to the specific telephone number to determine whether the person dialling the call is the authorized user.
At this point, the authorized user is automatically “logged in”. In a first non-limiting example, the authorized user is logged into a local application (e.g., Microsoft Outlook, MSN Messenger, etc. not shown) that utilizes user-specific information locally stored in database 108. In a second non-limiting example, validation application 112 triggers opening of an Internet session (e.g., Yahoo voice, Hotmail, etc.) with a target web site. The validation application accesses the account credentials associated with the authorized user and transfers them to the web site, thus allowing the authorized user to gain access (i.e., log in) to an Internet-accessible account via the web site.
In some embodiments, despite recognition of the CLID information as being associated with the authorized user, the caller may nevertheless be asked to authenticate himself by providing a password or PIN stored in database 108.
For additional security, when the password is used for an Internet application such as Skype, it is possible to avoid keeping the password in any database or on any device. The password is interactively asked to the user when needed and passed directly to the application login along with his user name. If the application logs in with no password error, it is thus verified that the user entered the correct password and is valid.
If CLID information is present but corresponds to a telephone number that is not in database 108, there is no automatic user login. Rather, the caller may be prompted to enter certain additional credentials.
If no CLID information is present, then either it is not possible for the caller to log in or it is possible for the caller to log in by providing a set of credentials including, possibly, entry of the specific telephone number.
Thus, the user may access Internet-related functions, such as Internet voice mail and email, using any regular telephone. Other functions are also possible, such as Internet telephony using the user's own computer as a bridge.
Now turning to
Method 200 comprises, at step 202, initiating a call from a first telephone means to a second telephone means. The call has associated thereto calling line identification (CLID) information.
At step 204, the second telephone means provides access to the Internet-enabled computing device. At step 206; the validation application, on the Internet-enabled computing device, compares the CLID information to the user-specific information.
Method 200 further comprises, at step 208, validating the CLID information using the comparison, and, at step 210, upon positive validation, logging in the user to the Internet-enabled computing device.
The above description is meant to be exemplary only, and one skilled in the art will recognize that changes may be made to the embodiments described without department from the scope of the invention disclosed. Modifications which fall within the scope of the present invention will be apparent to those skilled in the art, in light of a review of this disclosure, and such modifications are intended to fall within the appended claims.
This patent application claims priority of the U.S. provisional Patent Application No. 60/807,277, entitled “Auto-Login by Calling Line Identification (CLID)” and filed on Jul. 13, 2006, and of the US provisional Patent Application No. 60/807,287, entitled “Dial-by-Buddy” and filed on Jul. 13, 2006. The specifications and drawings of both applications are hereby incorporated by reference.
Number | Date | Country | |
---|---|---|---|
60807277 | Jul 2006 | US | |
60807287 | Jul 2006 | US |