Claims
- 1. A method for detecting user presence, comprising:
receiving a login message from a user; searching a multi-dimensional list in comprising information related to a plurality of other users associated with the user that generated the login message; and if the information stored in the multi-dimensional list indicates that any of the plurality of other users are logged in, then notifying the user that generated the login message of the presence of those other users that are logged in.
- 2. The method of claim 1, further comprising determining if the user can be allowed to login, and allowing the user to login if it is determined that they can be allowed to login.
- 3. The method of claim 2, further comprising denying the user from logging in if it is determined that the user cannot be allowed to login.
- 4. The method of claim 1, further comprising updating information associated with each of the plurality of other users, to indicate that the user that generated the login message is logged in.
- 5. The method of claim 4, wherein updating information associated with each of the other users comprises updating information in a multi-dimensional list associated with each of the plurality of other users.
- 6. The method of claim 1, further comprising, for each of the plurality of other users, searching a multi-dimensional associated with the other user to determine if it includes information related to the user that generated the login message.
- 7. The method of claim 6, further comprising updating the information in the multi-dimensional list associated with the other user to indicate the login status of the user that generated the login message if it is determined that the multi-dimensional list includes information related to the user that generated the login message.
- 8. The method of claim 7, further comprising notifying the other user of the login status of the user that generated the login message.
- 9. A method for detecting user presence, comprising:
receiving a login message from a user; searching a multi-dimensional list in comprising information related to a plurality of other users associated with the user that generated the login message; and for each of the plurality of other users, searching a multi-dimensional associated with the other user to determine if it includes information related to the user that generated the login message.
- 10. The method of claim 9, further comprising updating the information in the multi-dimensional list associated with the other user to indicate the login status of the user that generated the login message if it is determined that the multi-dimensional list includes information related to the user that generated the login message.
- 11. The method of claim 10, further comprising notifying the other user of the login status of the user that generated the login message.
- 12. The method of claim 9, further comprising, if the information stored in the multi-dimensional list indicates that any of the plurality of other users are logged in, then notifying the user that generated the login message of the presence of those other users that are logged in.
- 13. The method of claim 9, further comprising determining if the user can be allowed to login, and allowing the user to login if it is determined that they can be allowed to login.
- 14. The method of claim 13, further comprising denying the user from logging in if it is determined that the user cannot be allowed to login.
- 15. The method of claim 9, further comprising updating information associated with each of the plurality of other users, to indicate that the user that generated the login message is logged in.
- 16. The method of claim 15, wherein updating information associated with each of the other users comprises updating information in a multi-dimensional list associated with each of the plurality of other users.
RELATED APPLICATIONS INFORMATION
[0001] This application claims priority under 35 USC §119 to U.S. Provisional Application Ser. No. 60/387,761, entitled “PROXY ENFORCER FOR ROGUE PROTOCOL MESSAGES,” filed on Jun. 10, 2002 and to U.S. Provisional Application Ser. No. 60/445,648, entitled “DETECTION AND REPORTING OF USER PRESENCE,” filed on Feb. 7, 2003, which are both incorporated herein by reference as though set forth in full. This application also claims priority as a continuation-in-part under 35 U.S.C. §120 to U.S. patent application Ser. No. 10/167,228, entitled “EXTENDIBLE GATEWAY FOR PROTECTION AGAINST ROGUE PROTOCOLS,” filed on Jun. 10, 2003, which is incorporated herein by reference as though set in full.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60387761 |
Jun 2002 |
US |
|
60445648 |
Feb 2003 |
US |
Continuation in Parts (2)
|
Number |
Date |
Country |
Parent |
10167228 |
Jun 2002 |
US |
Child |
10459119 |
Jun 2003 |
US |
Parent |
10167229 |
Jun 2002 |
US |
Child |
10459119 |
Jun 2003 |
US |