<p>This protocol describes a way to communicate time of last user interaction with other XMPP entities over presence stanzas. User interaction refers to a human end user interacting with her device by means of keyboard, mouse, touch and so on. Based on this information XMPP clients can display the time a contact went idle or how for how long a contact has been idle. Thereby end users can get a hunch on the expected responsiveness of their contacts.</p>
<p>The described protocol uses absolute timestamps indicated as value of the 'since'-attribute in the <![CDATA[<idle>]]>-tag. The time, represented in the 'since'-attribute, is to be formatted according to &xep0082;.</p>
</section1>
<section1topic='Use Cases'anchor='usecases'>
Generally there are two main use cases for this extension explained in more detail in the following sections.
<section2topic='Presence with Last Interaction'anchor='last-interact'>
<p>After a user has not interacted with her device for some amount of time the user wants to inform her contacts about this fact. For this the client sends a presence stanza with time of last interaction.</p>
<examplecaption='Time of Last User Interaction in Auto-Away'><![CDATA[
<p>The amount of time after a client sends this enhanced presence is not set in stone but 5 minutes is suggested as a sensible default value.</p>
</section2>
<section2topic='Presence Indicating User Coming Back From Idle'anchor='back-from-idle'>
The moment a user comes back and uses her device again the client can inform user's contacts by sending a normal presence stanza like shown in the following example.
<examplecaption='Presence Indicating Return to Device'><![CDATA[
<p>Including a last user interaction notation in presence notifications can enable those who receive such notifications to determine exactly when a user has stopped interacting with his or her XMPP client or even their system, but this information is in essence already available if the user publishes timely presence updates. Therefore, this specification introduces no new vulnerabilities.</p>