Systematic enhancement of contact information
First Claim
1. A method for updating a database of personal contact information on an end-user electronic communications device, comprising:
- providing at least a first and second end-user electronic communications device, with each end-user device being capable of coupling to a communications network, whereinsaid first end-user electronic communications device is operated by a first user and said second end-user electronic communications device is operated by a second user, and whereinsaid first and/or said second end-user electronic communications device stores, in a contact database, at least one contact data element pertaining to said second user or said first user respectively;
providing a manager server having programmed instructions for controlling a server database, said server database comprising a plurality of contact data elements being obtained from a program operative on said first and/or second end-user electronic communications device via said manager server, whereinone or more of said plurality of contact data elements comprises a preferred permission protocol selected via said first and/or second user;
receiving a request, from said program operative on said first user and/or second end-user electronic communications device, for one or more of said plurality of contact data elements stored on said server database, said one or more of said plurality of contact data elements being identified by said at least one contact data element of said first and/or second user; and
systematically applying, by said manager server, said preferred permission protocol of requested said one or more of said plurality of contact data elements, whereinif said preferred permission protocol allows, systematically supplying, by said server manager, a requested contact data element to said program operative on said first and/or second end-user electronic communications device, and whereinif said preferred permission protocol does not allow supplying of said requested contact data element, said first or second user generating and sending a permission request for said requested contact data element to said first or second user.
0 Assignments
0 Petitions
Accused Products
Abstract
A system for systematically enhancing consumer and business contact information is disclosed. A server located “in the cloud” systematically controls a database of contact data elements, some of which have preferred and/or user-selected privacy protocols and update availability. These protocols and availability may restrict some data elements from being shared unless a data-owner'"'"'s explicit permission is obtained. When the server receives a request for such a restricted data element, the server may issue an email or text message in order to obtain the necessary permissions. If permission is granted, the server then supplies the requested data. Beyond this base functionality, expanded services provide complementary enhancement functionality.
-
Citations
19 Claims
-
1. A method for updating a database of personal contact information on an end-user electronic communications device, comprising:
-
providing at least a first and second end-user electronic communications device, with each end-user device being capable of coupling to a communications network, wherein said first end-user electronic communications device is operated by a first user and said second end-user electronic communications device is operated by a second user, and wherein said first and/or said second end-user electronic communications device stores, in a contact database, at least one contact data element pertaining to said second user or said first user respectively; providing a manager server having programmed instructions for controlling a server database, said server database comprising a plurality of contact data elements being obtained from a program operative on said first and/or second end-user electronic communications device via said manager server, wherein one or more of said plurality of contact data elements comprises a preferred permission protocol selected via said first and/or second user; receiving a request, from said program operative on said first user and/or second end-user electronic communications device, for one or more of said plurality of contact data elements stored on said server database, said one or more of said plurality of contact data elements being identified by said at least one contact data element of said first and/or second user; and systematically applying, by said manager server, said preferred permission protocol of requested said one or more of said plurality of contact data elements, wherein if said preferred permission protocol allows, systematically supplying, by said server manager, a requested contact data element to said program operative on said first and/or second end-user electronic communications device, and wherein if said preferred permission protocol does not allow supplying of said requested contact data element, said first or second user generating and sending a permission request for said requested contact data element to said first or second user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for systematically updating a database of personal contact information on an end-user electronic communications device, comprising:
-
providing at least a first and a second end-user electronic communications device, with each end-user device being capable of coupling to a communications network, wherein wherein said first end-user electronic communications device is operated by a first user and said second end-user electronic communications device is operated by a second user, and wherein said first and/or said second end-user electronic communications device stores, in a contact database, at least one contact data element pertaining to said second user or said first user respectively; providing a manager server having programmed instructions for systematically controlling a server database, said server database comprising a plurality of contact data elements, wherein one or more of said plurality of contact data elements comprises a preferred permission protocol selected via a user, wherein said server database is capable of querying at least one third party database, and wherein said at least one third party database comprises at least one B2C contact information database and at least one B2B contact information database; said user receiving a request, from said program operative on said end-user electronic communications device, for one or more of said plurality of contact data elements stored on said server database; and systematically applying, by said manager server, said preferred permission protocol of requested said one or more of said plurality of contact data elements, wherein if said preferred permission protocol allows, systematically supplying, by said server manager, a requested contact data element to said program operative on said end-user electronic communications device, and wherein if said preferred permission protocol does not allow a supplying of said requested contact data element, said server manager generating and sending a permission request for said requested contact data element to said user. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification