Providing temporary contact information
First Claim
Patent Images
1. A computer-implemented method for preventing misuse of contact information, the method comprising:
- identifying a first contact information associated with a first user;
generating temporary contact information for the first user, the temporary contact information excluding the first contact information, the temporary contact information configured to cause communication using the first contact information when received from a second user; and
generating termination controls associated with the temporary contact information, the termination controls configured to prevent use of the temporary identification after occurrence of an event, the event comprising a determination that the first user is no longer communicating with the second user, and wherein the termination controls comprise the ability to remotely, via a server, erase the temporary contact information from the second user'"'"'s device.
1 Assignment
0 Petitions
Accused Products
Abstract
Contact information associated with a user is identified. Temporary contact information, exclusive of the contact information, is generated and associated with the user. Termination controls, configured to prevent use of the temporary contact information after the occurrence of an event, are generated and associated with the temporary contact information.
-
Citations
19 Claims
-
1. A computer-implemented method for preventing misuse of contact information, the method comprising:
-
identifying a first contact information associated with a first user; generating temporary contact information for the first user, the temporary contact information excluding the first contact information, the temporary contact information configured to cause communication using the first contact information when received from a second user; and generating termination controls associated with the temporary contact information, the termination controls configured to prevent use of the temporary identification after occurrence of an event, the event comprising a determination that the first user is no longer communicating with the second user, and wherein the termination controls comprise the ability to remotely, via a server, erase the temporary contact information from the second user'"'"'s device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product for preventing misuse of contact information, the computer program product comprising a tangible computer readable storage medium having program code embodied therewith, the program code comprising computer readable program code configured to:
-
identify a first contact information associated with a first user; generate temporary contact information for the user, the temporary contact information not including the first contact information, the temporary identification configured to cause communication using the first contact information when received from a second user; and generate termination controls associated with the temporary identification, the termination controls configured to prevent use of the temporary identification after occurrence of an event, the event comprising a determination that the first user is no longer communicating with the second user, and wherein the termination controls comprise the ability to remotely, via a server, erase the temporary contact information from the second user'"'"'s device. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A system for preventing misuse of contact information, the system comprising:
-
a memory with program instructions stored thereon; and a processor in communication with the memory, wherein the system is configured to; identifying a first contact information associated with a first user; generating temporary contact information for the user, the temporary contact information not including the first contact information, the temporary identification configured to cause communication using the first contact information when received from a second user; and generating termination controls associated with the temporary identification, the termination controls configured to prevent use of the temporary identification after occurrence of an event, the event comprising a determination that the first user is no longer communicating with the second user, and wherein the termination controls comprise the ability to remotely, via a server, erase the temporary contact information from the second user'"'"'s device. - View Dependent Claims (16, 17, 18, 19)
-
Specification